A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

被引:114
作者
Wu, Fan [1 ]
Xu, Lili [2 ]
Kumari, Saru [3 ]
Li, Xiong [4 ,5 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
[3] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Wireless sensor network; Mutual authentication; Formal proof; Smart card; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SMART CARD; ARCHITECTURE; EFFICIENT; PROTOCOL;
D O I
10.1007/s12652-016-0345-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The notion Internet of Things (IoT) means all things in the global network can be interconnected and accessed. Wireless sensor network (WSN) is one of the most important applications of the notion and is widely used in nearly all scopes. In 2014, Hsieh et al. presented an improved authentication scheme for WSNs. But it has several weaknesses, including no session key, lack of mutual authentication and under the insider attack, the off-line guessing attack, the user forgery attack and the sensor capture attack. To avoid the weaknesses, we present a new authentication scheme which is also for WSNs. Then we employ the random oracle model to show the formal proof, and use the protocol analyzing tool Proverif to list the formal verification process. Compared with some recent schemes for WSNs via the aspects of security properties, the proposed scheme overcomes the common problems and fits for the security properties of IoT.
引用
收藏
页码:101 / 116
页数:16
相关论文
共 37 条
[1]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]  
[Anonymous], SHOCK VIBRATION
[3]  
Bresson Emmanuel., 2003, ACM C COMPUTER COMMU, P241, DOI DOI 10.1145/948109.948142
[4]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[5]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[7]   An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks [J].
Fan, Rong ;
He, Dao-jing ;
Pan, Xue-zeng ;
Ping, Ling-di .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (07) :550-560
[8]   A NETWORK ARCHITECTURE SOLUTION FOR EFFICIENT IOT WSN BACKHAULING: CHALLENGES AND OPPORTUNITIES [J].
Fantacci, Romano ;
Pecorella, Tommaso ;
Viti, Roberto ;
Carlini, Camillo .
IEEE WIRELESS COMMUNICATIONS, 2014, 21 (04) :113-119
[9]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[10]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935