A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

被引:176
作者
Li, Xiong [1 ,2 ]
Peng, Jieyao [1 ]
Niu, Jianwei [2 ]
Wu, Fan [3 ]
Liao, Junguo [1 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, Beijing 100076, Peoples R China
[3] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things (IoT); privacy protection; wireless sensor networks (WSNs); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; ANONYMOUS MUTUAL AUTHENTICATION; USER AUTHENTICATION; SECURITY; ECC;
D O I
10.1109/JIOT.2017.2787800
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.
引用
收藏
页码:1606 / 1615
页数:10
相关论文
共 32 条
[1]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[2]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[3]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[4]   Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Choi, Younsung ;
Lee, Donghoon ;
Kim, Jiye ;
Jung, Jaewook ;
Nam, Junghyun ;
Won, Dongho .
SENSORS, 2014, 14 (06) :10081-10106
[5]   A dynamic password-based user authentication scheme for hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sharma, Pranay ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) :1646-1656
[6]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[7]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[8]   A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen .
INFORMATION SCIENCES, 2015, 321 :263-277
[9]   An application-specific protocol architecture for wireless microsensor networks [J].
Heinzelman, WB ;
Chandrakasan, AP ;
Balakrishnan, H .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (04) :660-670
[10]   Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring [J].
Hossain, M. Shamim ;
Muhammad, Ghulam .
COMPUTER NETWORKS, 2016, 101 :192-202