An novel anonymous user WSN authentication for Internet of Things

被引:14
作者
Zhang, Xin [1 ]
Wen, Fengtong [1 ]
机构
[1] Jinan Univ, Sch Math Sci, 336 West Rd Nan Xinzhuang, Jinan 250022, Shandong, Peoples R China
基金
美国国家科学基金会;
关键词
Internet of Things; Authentication; Anonymity; Security; WSN; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; MUTUAL AUTHENTICATION; PROTOCOL;
D O I
10.1007/s00500-018-3226-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The proliferation of current wireless networks and devices has been promoting the development of Internet of Things (IoT). Since the devices have low data handling capabilities and limited storage space in IoT environment, authentication between users and servers is essential. In this paper, we briefly introduce two models tailored for the Internet of Things environment and design an authentication protocol for each model, respectively, which has a higher security level and the lower computational consumption compared with some existing authentications for IoT or WSN.
引用
收藏
页码:5683 / 5691
页数:9
相关论文
共 23 条
[1]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[2]   Preparation of magnetic nanoparticles via chemically induced transition: Dependence of components and magnetization on the concentration of treating solution used [J].
Chen, Yanshuang ;
Chen, Qin ;
Mao, Hong ;
Zhang, Ting ;
Qiu, Xiaoyan ;
Lin, Yueqiang ;
Li, Jian .
NANOMATERIALS AND NANOTECHNOLOGY, 2017, 7
[3]   A dynamic password-based user authentication scheme for hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sharma, Pranay ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) :1646-1656
[4]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[5]   A NETWORK ARCHITECTURE SOLUTION FOR EFFICIENT IOT WSN BACKHAULING: CHALLENGES AND OPPORTUNITIES [J].
Fantacci, Romano ;
Pecorella, Tommaso ;
Viti, Roberto ;
Carlini, Camillo .
IEEE WIRELESS COMMUNICATIONS, 2014, 21 (04) :113-119
[6]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[7]  
He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
[8]   Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment [J].
Jangirala, Srinivas ;
Mishra, Dheerendra ;
Mukhopadhyay, Sourav .
INFORMATION SYSTEMS SECURITY, 2016, 10063 :45-65
[9]   Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks' [J].
Khan, Muhammad Khurram ;
Alghathbar, Khaled .
SENSORS, 2010, 10 (03) :2450-2459
[10]   Survey on secure communication protocols for the Internet of Things [J].
Kim Thuat Nguyen ;
Laurent, Maryline ;
Oualha, Nouha .
AD HOC NETWORKS, 2015, 32 :17-31