Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks

被引:224
作者
Gope, Prosanta [1 ]
Das, Ashok Kumar [2 ]
Kumar, Neeraj [3 ]
Cheng, Yongqiang [1 ]
机构
[1] Univ Hull, Dept Comp Sci & Technol, Kingston Upon Hull HU6 7RX, N Humberside, England
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
基金
英国工程与自然科学研究理事会;
关键词
Industrial wireless sensor network (IWSN); mutual authentication; key agreement; physically unclonable function (PUF); security; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME;
D O I
10.1109/TII.2019.2895030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN having constraints of energy consumption, coverage, connectivity, and security. However, security and privacy is one of the major challenges in IWSN as the nodes are connected to Internet and usually located in an unattended environment with minimum human interventions. In IWSN, there is a fundamental requirement for a user to access the real-time information directly from the designated sensor nodes. This task demands to have a user authentication protocol. To satisfy this requirement, this paper proposes a lightweight and privacy-preserving mutual user authentication protocol in which only the user with a trusted device has the right to access the IWSN. Therefore, in the proposed scheme, we considered the physical layer security of the sensor nodes. We show that the proposed scheme ensures security even if a sensor node is captured by an adversary. The proposed protocol uses the lightweight cryptographic primitives, such as one way cryptographic hash function, physically unclonable function, and bitwise exclusive operations. Security and performance analysis shows that the proposed scheme is secure, and is efficient for the resource-constrained sensing devices in IWSN.
引用
收藏
页码:4957 / 4968
页数:12
相关论文
共 35 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
[Anonymous], 1995, Secure Hash Standard
[3]  
Basha EA, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P295
[4]   The science of guessing: analyzing an anonymized corpus of 70 million passwords [J].
Bonneau, Joseph .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :538-552
[5]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[6]   A dynamic password-based user authentication scheme for hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sharma, Pranay ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) :1646-1656
[7]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]  
Erdelj M., 2012, APPL IND WIRELESS SE
[10]   Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :580-589