An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs

被引:5
作者
Zhou, Boqing [1 ,2 ]
Li, Sujun [1 ]
Wang, Weiping [3 ]
Wang, Jianxin [3 ]
Cheng, Yun [4 ]
Wu, Jie [5 ]
机构
[1] Shaoguan Univ, Sch Informat Sci & Engn, Shaoguan 512005, Peoples R China
[2] Hunan Normal Univ, MOE LCSM, Sch Math & Stat, Changsha 410081, Hunan, Peoples R China
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[5] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
3-D backward key chain based on deployment knowledge; authentication; mobile sink (MS) replication attack; unattended wireless sensor networks (UWSNs); KEY PRE-DISTRIBUTION; SENSOR; MANAGEMENT; SECURE;
D O I
10.1109/JIOT.2019.2930823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual authentication between a MS and a sensor node is less than 1 and 2) during the authentication phase, the energy consumption of sensor nodes increases significantly as the deployment area expands. In this paper, we construct 3-D backward key chains based on deployment knowledge and propose a new authentication scheme based on these. As compared with these existing related schemes, the detailed theory analysis and simulation results indicate that the scheme can ensure that a MS can be authenticated by sensor nodes, and can improve the resilience of networks' MS replication attack with low energy consumption.
引用
收藏
页码:9738 / 9747
页数:10
相关论文
共 50 条
[41]   Computationally efficient and secure anonymous authentication scheme for IoT-based mobile pay-TV systems [J].
Kumaravelu, Ramesh ;
Sadaiyandi, Rajakumar ;
Selvaraj, Anandamurugan ;
Selvaraj, Jeeva ;
Karthick, Gayathiri .
COMPUTATIONAL INTELLIGENCE, 2020, 36 (03) :994-1009
[42]   An efficient nonce-based authentication scheme with key agreement [J].
Chen, YC ;
Yeh, LY .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) :982-994
[43]   Efficient Batch Authentication Scheme Based on Edge Computing in IIoT [J].
Cui, Jie ;
Wang, Fengqun ;
Zhang, Qingyang ;
Gu, Chengjie ;
Zhong, Hong .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01) :357-368
[44]   An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs [J].
Jiang, Shunrong ;
Zhu, Xiaoyan ;
Wang, Liangmin .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (08) :2193-2204
[45]   NERA: A new and efficient RSU based authentication scheme for VANETs [J].
Majid Bayat ;
Morteza Pournaghi ;
Majid Rahimi ;
Mostafa Barmshoory .
Wireless Networks, 2020, 26 :3083-3098
[46]   An efficient authentication scheme based on Zero Trust for UAV swarm [J].
Yang, Dongyu ;
Zhao, Yue ;
Wu, Kaijun ;
Guo, Xiaoyu ;
Peng, Haiyang .
2021 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA, 2021, :356-360
[47]   An Efficient RSA-Based Remote User Authentication Scheme [J].
Shi, Wenbo ;
Chen, Yitao .
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2012, 15 (03) :266-276
[48]   An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 :1-8
[49]   An Efficient Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings [J].
Xiong, Ling ;
Peng, Tu ;
Peng, Dai-Yuan ;
Liang, Hong-Bin ;
Liu, Zhi-Cai .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (02) :341-360
[50]   An efficient authentication scheme for vehicular networks based on Merkle tree [J].
Liu, Guijiang ;
Lu, Hao ;
Wang, Wenming ;
Huang, Haiping .
COMPUTER NETWORKS, 2025, 269