An Authentication Protocol for Future Sensor Networks

被引:38
|
作者
Bilal, Muhammad [1 ]
Kang, Shin-Gak [1 ]
机构
[1] Univ Sci & Technol, Elect & Telecommun Res Inst, 218 Gajeong Ro, Daejeon 34129, South Korea
来源
SENSORS | 2017年 / 17卷 / 05期
关键词
authentication; sensor networks; network security; key distribution; privacy; BAN logic; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WORMHOLE ATTACKS; INTERNET; THINGS;
D O I
10.3390/s17050979
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
引用
收藏
页数:29
相关论文
共 50 条
  • [31] On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
    Fatima, Sumbal
    Akram, Muhammad Arslan
    Mian, Adnan Noor
    Kumari, Saru
    Chen, Chien-Ming
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (02) : 1079 - 1106
  • [32] An Improved Multifactor User Authentication Scheme for Wireless Sensor Networks
    Tyagi, Gaurav
    Kumar, Rahul
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (02) : 1311 - 1343
  • [33] A Robust Mutual Authentication Protocol for Wireless Sensor Networks
    Chen, Tien-Ho
    Shih, Wei-Kuan
    ETRI JOURNAL, 2010, 32 (05) : 704 - 712
  • [34] Efficient user authentication and key agreement in wireless sensor networks
    Juang, Wen-Shenq
    INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 15 - 29
  • [35] CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks
    Cabuk, Umut Can
    Dalkilic, Gokhan
    Dagdeviren, Orhan
    IEEE ACCESS, 2021, 9 : 78400 - 78414
  • [36] Sensor Authentication in Collaborating Sensor Networks
    Bielefeldt, Jake
    Chellappan, Sriram
    2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET), 2014,
  • [37] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [38] WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks
    Yi, Fumin
    Zhang, Lei
    Xu, Lijuan
    Yang, Shumian
    Lu, Yanrong
    Zhao, Dawei
    SENSORS, 2022, 22 (19)
  • [39] A robust authentication and access control protocol for securing wireless healthcare sensor networks
    Ali, Zeeshan
    Ghani, Anwar
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Giri, Debasis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [40] A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chu, Shu-Chuan
    Kumari, Saru
    Kumar, Sachin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021