Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs

被引:4
作者
Yang, Ting [1 ]
Zhai, Feng [1 ,2 ]
Xu, HaiQing [2 ]
Li, Wei [3 ]
机构
[1] Tianjin Univ, Weijin Rd 92, Tianjin 300072, Peoples R China
[2] China Elect Power Res Inst, State Grid, 15 Xiaoying East Rd 15, Beijing 300072, Peoples R China
[3] Univ Sydney, Sch Comp Sci, Sydney, NSW 2006, Australia
基金
中国国家自然科学基金;
关键词
Multi-gate; Wireless sensor networks; Authentication protocol; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; MUTUAL AUTHENTICATION; WIRELESS; INTERNET;
D O I
10.1016/j.egyr.2022.02.061
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The wireless sensor networks (WSNs) are the core collecting network of the power internet of things (PIoT). With the development of PIoT, higher standards of timeliness and security are required for the data collection work done by the WSNs. In recent years, researchers have proposed a series of lightweight security protocols for identity authentication and data access in resource-constrained systems such as WSNs. But on one hand, these lightweight security protocols do not take into account of needs of the simultaneous access by multiple users, thus will not meet the requirements of PIoT; on the other hand, it does not take the entire process of remote accessing into account when calculating communication efficiency, and cannot fully reflect the advantage in efficiency. Therefore, this paper proposes a PIoT-oriented WSNs communication model based on PIoT's characteristics such as multi-user, and higher standard of timeliness and security. It also designs a new identity authentication protocol for multi-gateway WSNs. Through the informal security analysis, the protocol proposed in this paper is proved to be more secure and efficient comparing to other multi-user access protocols. (C) 2022 Published by Elsevier Ltd.
引用
收藏
页码:1200 / 1211
页数:12
相关论文
共 38 条
[1]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[2]  
Amadio Roberto M, 2002, P 13 INT C CONC THEO
[3]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[4]   Symmetric encryption in a simulatable Dolev-Yao style cryptographic library [J].
Backes, M ;
Pfitzmann, B .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :204-218
[5]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[6]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[7]  
Cui Zhiyang, 2012, HIGH SCI TECHNOL, P252
[8]  
DaeHun Nyang, 2009, IACR CRYPTOLOGY EPRI
[10]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090