SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network

被引:13
作者
Singh, Deepti [1 ]
Kumar, Bijendra [1 ]
Singh, Samayveer [2 ]
Chand, Satish [3 ]
机构
[1] Netaji Subhas Inst Technol, Div Comp Engn, New Delhi, India
[2] Natl Inst Technol Jalandhar, Dept Comp Sci & Engn, Jalandhar, Punjab, India
[3] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
关键词
User authentication; MAC function; Session key; Security and privacy; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; CRYPTANALYSIS; IMPROVEMENT; PROTOCOL; PRIVACY;
D O I
10.1007/s11277-019-06336-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
User authentication is an elementary security prerequisite in resource-constrained wireless sensor networks (WSNs). Recently, Amin et al. presented an anonymity preserving authentication scheme for WSN which is secure against both active and passive attacks. In this paper, we first cryptanalyzed Amin et al. scheme and find that it suffers from the password guessing, impersonation, session key leakage attacks. To address these deficiencies, we propose a secure authentication scheme for wireless sensor network (SMAC-AS) by using MAC function. It additionally uses symmetric encryption and decryption operations for authentication to prevent forgery. We use OTCODE as one time activation code that is more secure than password. The SMAC-AS is a low cost and much faster in practice because it uses light weight MAC function and symmetric operations. Decryption of MAC is not easy. Moreover, SMAC-AS also helps in faster and efficient transmission of the message because of the lightweight function and operations which leads to saving the battery of the sensor nodes. We use BAN logic for authentication proof. The formal security analysis using random oracle model is done to show its efficacy.
引用
收藏
页码:1289 / 1308
页数:20
相关论文
共 27 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]   Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications [J].
Al Ameen, Moshaddique ;
Liu, Jingwei ;
Kwak, Kyungsup .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) :93-101
[3]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[4]   An Authentication Protocol for Future Sensor Networks [J].
Bilal, Muhammad ;
Kang, Shin-Gak .
SENSORS, 2017, 17 (05)
[5]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[6]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[7]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[8]  
He DJ, 2010, AD HOC SENS WIREL NE, V10, P361
[9]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60
[10]   An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks [J].
Jiang, Qi ;
Ma, Jianfeng ;
Lu, Xiang ;
Tian, Youliang .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) :1070-1081