An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

被引:350
|
作者
Farash, Mohammad Sabzinejad [1 ]
Turkanovic, Muhamed [2 ]
Kumari, Saru [3 ]
Hoelbi, Marko [2 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[2] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
[3] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
关键词
Internet of Things; Wireless sensor networks; Key agreement; Authentication; BAN-logic; AVISPA tools; MUTUAL AUTHENTICATION; SECURITY; PROTOCOL; ATTACKS;
D O I
10.1016/j.adhoc.2015.05.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working on new techniques and efficient approaches on how to integrate WSN better into the IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanovic et al.'s proposed a highly efficient and novel user authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the JOT notion. Their scheme presented a novel approach where a user from the JOT can authenticate with a specific sensor node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfortunately we have found that Turkanovic et al.'s scheme has some security shortcomings and is susceptible to some cryptographic attacks. This paper focuses on overcoming the security weaknesses of Turkanovic et al.'s scheme, by proposing a new and improved UAKAS. The proposed scheme enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools confirm the security properties of the proposed scheme. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:152 / 176
页数:25
相关论文
共 50 条
  • [1] Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
    Jangirala, Srinivas
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 45 - 65
  • [2] A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
    Chen, Yuwen
    Martinez, Jose-Fernan
    Castillejo, Pedro
    Lopez, Lourdes
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [3] A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
    Chen, Yuwen
    Lopez, Lourdes
    Martinez, Jose-Fernan
    Castillejo, Pedro
    JOURNAL OF SENSORS, 2018, 2018
  • [4] A user authentication and key agreement scheme for heterogeneous wireless sensor networks
    Yan L.-L.
    Chang Y.
    Zhang S.-B.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60
  • [5] A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    Turkanovic, Muhamed
    Brumen, Bostjan
    Hoelbl, Marko
    AD HOC NETWORKS, 2014, 20 : 96 - 112
  • [6] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [7] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    Wireless Personal Communications, 2016, 89 : 447 - 465
  • [8] An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment
    Almuhaideb, Abdullah M.
    Al-Khulaifi, Dania M.
    IEEE ACCESS, 2024, 12 : 175773 - 175789
  • [9] An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
    Tyagi, Pooja
    Kumari, Saru
    Alzahrani, Bander A.
    Gupta, Anshay
    Yang, Ming-Hour
    SENSORS, 2022, 22 (22)
  • [10] Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
    Singh, Akansha
    Awasthi, Amit K.
    Singh, Karan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1881 - 1898