A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

被引:176
作者
Li, Xiong [1 ,2 ]
Peng, Jieyao [1 ]
Niu, Jianwei [2 ]
Wu, Fan [3 ]
Liao, Junguo [1 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, Beijing 100076, Peoples R China
[3] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things (IoT); privacy protection; wireless sensor networks (WSNs); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; ANONYMOUS MUTUAL AUTHENTICATION; USER AUTHENTICATION; SECURITY; ECC;
D O I
10.1109/JIOT.2017.2787800
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.
引用
收藏
页码:1606 / 1615
页数:10
相关论文
共 32 条
[11]   An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks [J].
Jiang, Qi ;
Ma, Jianfeng ;
Wei, Fushan ;
Tian, Youliang ;
Shen, Jian ;
Yang, Yuanyuan .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 76 :37-48
[12]   An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks [J].
Jiang, Qi ;
Ma, Jianfeng ;
Lu, Xiang ;
Tian, Youliang .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) :1070-1081
[13]   A User Anonymous Mutual Authentication Protocol [J].
Kumari, Saru ;
Li, Xiong ;
Wu, Fan ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Khan, Muhammad Khurram .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09) :4508-4528
[14]   A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things [J].
Li, Xiong ;
Niu, Jianwei ;
Bhuiyan, Md Zakirul Alam ;
Wu, Fan ;
Karuppiah, Marimuthu ;
Kumari, Saru .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3599-3609
[15]   A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments [J].
Li, Xiong ;
Niu, Jianwei ;
Kumari, Saru ;
Wu, Fan ;
Sangaiah, Arun Kumar ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 :194-204
[16]   Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks [J].
Li, Xiong ;
Ibrahim, Maged Hamada ;
Kumari, Saru ;
Sangaiah, Arun Kumar ;
Gupta, Vidushi ;
Choo, Kim-Kwang Raymond .
COMPUTER NETWORKS, 2017, 129 :429-443
[17]   Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update [J].
Li, Xiong ;
Niu, Jianwei ;
Liao, Junguo ;
Liang, Wei .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) :374-382
[18]   An enhanced smart card based remote user password authentication scheme [J].
Li, Xiong ;
Niu, Jianwei ;
Khan, Muhammad Khurram ;
Liao, Junguo .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) :1365-1371
[19]   An Untraceable ECC-Based Remote User Authentication Scheme [J].
Mehmood, Zahid ;
Chen, Gongliang ;
Li, Jianhua ;
Albeshri, Aiiad .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03) :1742-1760
[20]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552