An enhanced anonymous authentication protocol for wireless sensor networks

被引:2
作者
Li, Jiping [1 ,2 ]
Yu, Tong [1 ,2 ]
Wu, Yunyun [1 ]
Kong, Xia [1 ]
Liu, Shouyin [3 ]
机构
[1] Hubei Engn Univ, Sch Comp & Informat Sci, Xiaogan 432000, Hubei, Peoples R China
[2] Hubei Univ, Sch Comp Sci & Informat Engn, Wuhan 430062, Hubei, Peoples R China
[3] Cent China Normal Univ, Coll Phys Sci & Technol, Wuhan 430079, Hubei, Peoples R China
关键词
authentication; key agreement; wireless sensor networks; WSNs; BAN-logic; AVISPA; KEY AGREEMENT SCHEME; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; SECURITY; INTERNET; THINGS; IOT;
D O I
10.1504/IJAHUC.2020.110822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless sensor networks (WSNs) have played important roles in a variety of areas. However, the nature of wireless communications and restricted resources make it more likely to suffer from various kinds of attacks. As to this problem, many authentication protocols have been proposed recently to secure the communications in WSNs. Among these schemes, Singh et al.'s protocol shows great novelty. Unfortunately, we find in our current research that Singh et al.'s protocol still has the vulnerabilities to stolen/lost smart card attacks, privileged-insider attacks, the session key leakage attacks, and so on. To solve these problems, we first propose an enhanced anonymous authentication protocol by using Hash function and bitwise XOR operations based on Singh et al.'s protocol. Secondly, we conduct detailed security analysis to the proposed authentication protocol, and make security-feature comparisons with related protocols. In addition, we give formal proof and security verification of the proposed protocol by using Burrows-Abadi-Needham (BAN) logic and AVISPA tool, respectively. Finally, we give performance comparisons in terms of computing costs and communicating costs, respectively. Comparative summaries demonstrate that our protocol provides more extractive features and security guarantees with little increased overheads.
引用
收藏
页码:136 / 149
页数:14
相关论文
共 24 条
[1]  
Abadi M., 1991, Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, P201, DOI 10.1145/112600.112618
[2]  
Amin R., 2017, WIRELESS PERS COMMUN, V94, P1881
[3]  
[Anonymous], 2015, GLOBAL TRENDS FUTURE
[4]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]  
Bibri SE, 2015, ATL AMB PERVAS INTEL, V10, P217
[6]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[7]   Notes on "Secure authentication scheme for IoT and cloud servers" [J].
Chang, Chin-Chen ;
Wu, Hsiao-Ling ;
Sun, Chin-Yu .
PERVASIVE AND MOBILE COMPUTING, 2017, 38 :275-278
[8]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[9]   Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond ;
Park, YoungHo .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) :1310-1322
[10]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090