An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs

被引:5
作者
Zhou, Boqing [1 ,2 ]
Li, Sujun [1 ]
Wang, Weiping [3 ]
Wang, Jianxin [3 ]
Cheng, Yun [4 ]
Wu, Jie [5 ]
机构
[1] Shaoguan Univ, Sch Informat Sci & Engn, Shaoguan 512005, Peoples R China
[2] Hunan Normal Univ, MOE LCSM, Sch Math & Stat, Changsha 410081, Hunan, Peoples R China
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[5] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
3-D backward key chain based on deployment knowledge; authentication; mobile sink (MS) replication attack; unattended wireless sensor networks (UWSNs); KEY PRE-DISTRIBUTION; SENSOR; MANAGEMENT; SECURE;
D O I
10.1109/JIOT.2019.2930823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual authentication between a MS and a sensor node is less than 1 and 2) during the authentication phase, the energy consumption of sensor nodes increases significantly as the deployment area expands. In this paper, we construct 3-D backward key chains based on deployment knowledge and propose a new authentication scheme based on these. As compared with these existing related schemes, the detailed theory analysis and simulation results indicate that the scheme can ensure that a MS can be authenticated by sensor nodes, and can improve the resilience of networks' MS replication attack with low energy consumption.
引用
收藏
页码:9738 / 9747
页数:10
相关论文
共 50 条
[31]   An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing [J].
Xu, Yuan ;
Zhou, Yanwei ;
Yang, Bo ;
Qiao, Zirui ;
Wang, Zhaolong ;
Xia, Zhe ;
Zhang, Mingwu .
IEEE SYSTEMS JOURNAL, 2023, 17 (01) :1012-1023
[32]   An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services [J].
Xiong, Ling ;
Li, Fagen ;
He, Mingxing ;
Liu, Zhicai ;
Peng, Tu .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) :2309-2323
[33]   An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems [J].
Sun, Hung-Min ;
Leu, Muh-Chyi .
IEEE TRANSACTIONS ON MULTIMEDIA, 2009, 11 (05) :947-959
[34]   An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network [J].
Mo, Jiaqing ;
Hu, Zhongwang ;
Lin, Yuhua .
CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 :490-505
[35]   An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem [J].
Ranjan, Pratik ;
Om, Hari .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (01) :217-244
[36]   An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network [J].
Moghadam, Mostafa Farhadi ;
Nikooghadam, Mahdi ;
Al Jabban, Maytham Azhar Baqer ;
Alishahi, Mohammad ;
Mortazavi, Leili ;
Mohajerzadeh, Amirhossein .
IEEE ACCESS, 2020, 8 :73182-73192
[37]   A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing [J].
Jia, Xiaoying ;
Luo, Min ;
Choo, Kim-Kwang Raymond ;
Li, Li ;
He, Debiao .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) :10108-10120
[38]   A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services [J].
Yu, Linsheng ;
He, Mingxing ;
Liang, Hongbin ;
Xiong, Ling ;
Liu, Yang .
SENSORS, 2023, 23 (03)
[39]   GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF [J].
Shliakhtina, E. A. ;
Gamayunov, D. Y. .
PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2021, (51) :68-84
[40]   Efficient remote user authentication scheme based on generalized ElGamal signature scheme [J].
Yoon, EJ ;
Ryu, EK ;
Yoo, KY .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :568-570