A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

被引:114
作者
Wu, Fan [1 ]
Xu, Lili [2 ]
Kumari, Saru [3 ]
Li, Xiong [4 ,5 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
[3] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; Wireless sensor network; Mutual authentication; Formal proof; Smart card; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SMART CARD; ARCHITECTURE; EFFICIENT; PROTOCOL;
D O I
10.1007/s12652-016-0345-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The notion Internet of Things (IoT) means all things in the global network can be interconnected and accessed. Wireless sensor network (WSN) is one of the most important applications of the notion and is widely used in nearly all scopes. In 2014, Hsieh et al. presented an improved authentication scheme for WSNs. But it has several weaknesses, including no session key, lack of mutual authentication and under the insider attack, the off-line guessing attack, the user forgery attack and the sensor capture attack. To avoid the weaknesses, we present a new authentication scheme which is also for WSNs. Then we employ the random oracle model to show the formal proof, and use the protocol analyzing tool Proverif to list the formal verification process. Compared with some recent schemes for WSNs via the aspects of security properties, the proposed scheme overcomes the common problems and fits for the security properties of IoT.
引用
收藏
页码:101 / 116
页数:16
相关论文
共 37 条
[31]   A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof [J].
Wu, Fan ;
Xu, Lili ;
Kumari, Saru ;
Li, Xiong ;
Alelaiwi, Abdulhameed .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3847-3863
[32]   A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks [J].
Wu, Fan ;
Xu, Lili ;
Kumari, Saru ;
Li, Xiong .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 45 :274-285
[33]   An improved and provable self-certified digital signature scheme with message recovery [J].
Wu, Fan ;
Xu, Lili .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) :344-357
[34]   An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity [J].
Xu, Lili ;
Wu, Fan .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) :245-260
[35]   A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks [J].
Xue, Kaiping ;
Ma, Changsha ;
Hong, Peilin ;
Ding, Rong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) :316-323
[36]   A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Yeh, Hsiu-Lien ;
Chen, Tien-Ho ;
Liu, Pin-Chuan ;
Kim, Tai-Hoo ;
Wei, Hsin-Wen .
SENSORS, 2011, 11 (05) :4767-4779
[37]   A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks [J].
Yoo, Sang Guun ;
Park, Keun Young ;
Kim, Juho .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,