A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

被引:176
作者
Li, Xiong [1 ,2 ]
Peng, Jieyao [1 ]
Niu, Jianwei [2 ]
Wu, Fan [3 ]
Liao, Junguo [1 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, Beijing 100076, Peoples R China
[3] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things (IoT); privacy protection; wireless sensor networks (WSNs); WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; ANONYMOUS MUTUAL AUTHENTICATION; USER AUTHENTICATION; SECURITY; ECC;
D O I
10.1109/JIOT.2017.2787800
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) can be used to collect the required environment parameters for specific applications. Due to the resource limitation of sensor node and the open nature of wireless channel, security has become an enormous challenge in WSN. Authentication as a basic security service can be used to guarantee the legality of data access in WSN. Recently, Chang and Le proposed two authentication protocols for WSN for different security requirements. However, their protocol cannot provide proper mutual authentication and has other security and functionality defects. We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols. The security of the proposed protocol is analyzed, and the security, functionality and performance of our protocol are compared with other related protocols. The comparison results and simulation results by NS-3 show that the proposed protocol is robust and energy efficient for IoT applications.
引用
收藏
页码:1606 / 1615
页数:10
相关论文
共 32 条
[21]  
nsnam. org, 2017, NS326 NSN
[22]  
Roy S., IEEE Internet Things J.
[23]   A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography [J].
Shi, Wenbo ;
Gong, Peng .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[24]   Security, privacy and trust in Internet of Things: The road ahead [J].
Sicari, S. ;
Rizzardi, A. ;
Grieco, L. A. ;
Coen-Porisini, A. .
COMPUTER NETWORKS, 2015, 76 :146-164
[25]   Research Directions for the Internet of Things [J].
Stankovic, John A. .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (01) :3-9
[26]  
Tian L., 2016, Proceedings of the 2016 Workshop on Ns-, V3, P49, DOI DOI 10.1145/2915371.2915372
[27]   A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion [J].
Turkanovic, Muhamed ;
Brumen, Bostjan ;
Hoelbl, Marko .
AD HOC NETWORKS, 2014, 20 :96-112
[28]   Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment [J].
Wang, Ding ;
He, Debiao ;
Wang, Ping ;
Chu, Chao-Hsien .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) :428-442
[29]   Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks [J].
Wang, Ding ;
Wang, Ping .
AD HOC NETWORKS, 2014, 20 :1-15
[30]   Internet of Things in Industries: A Survey [J].
Xu, Li Da ;
He, Wu ;
Li, Shancang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (04) :2233-2243