A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion

被引:84
|
作者
Wu, Fan [1 ]
Li, Xiong [2 ]
Xu, Lili [3 ]
Vijayakumar, Pandi [4 ]
Kumar, Neeraj [5 ,6 ,7 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Inst Cyber Secur, Chengdu 611731, Peoples R China
[3] Xiamen Univ, Sch Informat, Xiamen 361005, Peoples R China
[4] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[5] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[6] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[7] King Abdulaziz Univ, Jeddah, Saudi Arabia
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
关键词
Wireless sensor networks; Authentication; Biometrics (access control); Password; Protocols; Computer science; three-factor authentication; NS-3; wireless sensor network (WSN); proverif;
D O I
10.1109/JSYST.2020.2981049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an important topic of IoT, wireless sensor network (WSN) data transmission is popular nowadays. It is widely accepted that the wireless channel is hazard, and multifactor authentication schemes are proposed to save the hazard of wireless communication circumstance. To overcome the problems, we give a fresh three-factor authentication scheme providing session keys for WSNs. Formal verification given by Proverif illustrates that the new scheme keeps security properties. At the same time, the informal analysis also denotes that the proposed scheme is practical and satisfies general needs, such as counteraction against various attacks and meeting security properties. Compared to some recent similar schemes, the proposed scheme performs better in security and is suitable for application. At last, we use NS-3 for simulation. The results from the simulation show that the scheme can run in IoT environment normally and has practical perspective.
引用
收藏
页码:1120 / 1129
页数:10
相关论文
共 50 条
  • [21] A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    Ashok Kumar Das
    Peer-to-Peer Networking and Applications, 2016, 9 : 223 - 244
  • [22] Security Analysis on "A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems"
    Saleem, Muhammad Asad
    Shamshad, Salman
    Ahmed, Shafiq
    Ghaffar, Zahid
    Mahmood, Khalid
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5557 - 5559
  • [23] Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks
    Gao, Guangyong
    Feng, Zhao
    Xia, Zhihua
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2023, 7 (03): : 1297 - 1308
  • [24] An improved and provably secure three-factor user authentication scheme for wireless sensor networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (01) : 1 - 20
  • [25] A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
    Ashok Kumar Das
    Wireless Personal Communications, 2015, 82 : 1377 - 1404
  • [28] Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments
    Lee, JoonYoung
    Yu, SungJin
    Park, KiSung
    Park, YoHan
    Park, YoungHo
    SENSORS, 2019, 19 (10):
  • [29] A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
    Yu, SungJin
    Lee, JoonYoung
    Park, YoHan
    Park, YoungHo
    Lee, SangWoo
    Chung, BoHeung
    APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [30] Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks
    Nyangaresi, Vincent Omollo
    AD HOC NETWORKS, 2023, 142