An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

被引:120
作者
Wu, Fan [1 ]
Xu, Lili [2 ]
Kumari, Saru [3 ]
Li, Xiong [4 ]
Shen, Jian [5 ]
Choo, Kim-Kwang Raymond [6 ]
Wazid, Mohammad [7 ]
Das, Ashok Kumar [7 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[7] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Prades, India
基金
中国国家自然科学基金;
关键词
Smart card; Sensor capture attack; Wireless sensor network; Multi-gateway; User anonymity; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; SMART CARD; SECURITY; PROTOCOL; ANONYMITY; INTERNET;
D O I
10.1016/j.jnca.2016.12.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide range of industries such as agriculture and military. However, designing a secure and reliable authentication scheme for WSNs that can be deployed in IoT remains a research and operational challenge. For example, recently in 2016, Amin and Biswas showed that the Turcanovic et al.'s scheme is vulnerable to smart card loss attack, user impersonation attack, etc. They then proposed a new authentication scheme for WSNs with multi-gateway. In this paper, we revisit the scheme of Amin and Biswas and reveal previously unknown vulnerabilities in the scheme (i.e. sensor capture attack, user forgery attack, gateway forgery attack, sensor forgery attack and off-line guessing attack). In addition, we demonstrate that the user in the scheme can be tracked due to the use of a constant pseudo-identity and previously established session keys can be calculated by the attacker. Rather than attempting to fix a broken scheme, we present a novel authentication scheme for multi-gateway based WSNs. We then demonstrate the security of the proposed scheme using Proverif, as well as evaluating the good performance of the scheme using NS-2 simulation.
引用
收藏
页码:72 / 85
页数:14
相关论文
共 53 条
[1]   An Efficient Biometric Authentication Protocol for Wireless Sensor Networks [J].
Althobaiti, Ohood ;
Al-Rodhaan, Mznah ;
Al-Dhelaan, Abdullah .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[2]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[3]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[4]  
[Anonymous], FUTURE GENER COMPUT
[5]  
[Anonymous], J NETW COMPUT APPL
[6]  
[Anonymous], 2009, ADV INFORM SECURITY
[7]   Cloud computing adoption framework: A security framework for business clouds [J].
Chang, Victor ;
Kuo, Yen -Hung ;
Ramachandran, Muthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 :24-41
[8]  
Chang V, 2016, IEEE T SERV COMPUT, V9, P138, DOI [10.1109/TSC.2015.2491281, 10.1109/ISSNIP.2015.7106910]
[9]  
Chaudhry S.A., 2016, WIREL PERS COMMUN
[10]  
Chaudhry S. A., 2016, SECUR COMMUN NETW