SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network

被引:0
|
作者
Deepti Singh
Bijendra Kumar
Samayveer Singh
Satish Chand
机构
[1] Netaji Subhas Institute of Technology,Division of Computer Engineering
[2] National Institute of Technology Jalandhar,Department of Computer Science and Engineering
[3] Jawaharlal Nehru University,School of Computer and Systems Sciences
来源
Wireless Personal Communications | 2019年 / 107卷
关键词
User authentication; MAC function; Session key; Security and privacy;
D O I
暂无
中图分类号
学科分类号
摘要
User authentication is an elementary security prerequisite in resource-constrained wireless sensor networks (WSNs). Recently, Amin et al. presented an anonymity preserving authentication scheme for WSN which is secure against both active and passive attacks. In this paper, we first cryptanalyzed Amin et al. scheme and find that it suffers from the password guessing, impersonation, session key leakage attacks. To address these deficiencies, we propose a secure authentication scheme for wireless sensor network (SMAC-AS) by using MAC function. It additionally uses symmetric encryption and decryption operations for authentication to prevent forgery. We use OTCODE as one time activation code that is more secure than password. The SMAC-AS is a low cost and much faster in practice because it uses light weight MAC function and symmetric operations. Decryption of MAC is not easy. Moreover, SMAC-AS also helps in faster and efficient transmission of the message because of the lightweight function and operations which leads to saving the battery of the sensor nodes. We use BAN logic for authentication proof. The formal security analysis using random oracle model is done to show its efficacy.
引用
收藏
页码:1289 / 1308
页数:19
相关论文
共 50 条
  • [1] SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network
    Singh, Deepti
    Kumar, Bijendra
    Singh, Samayveer
    Chand, Satish
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (02) : 1289 - 1308
  • [2] A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX
    Liu, Xin
    Guo, Zhenbin
    Ma, Jun
    Song, Yuchen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3533 - 3547
  • [3] A Secure and Efficient Authentication Protocol in Wireless Sensor Network
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 17 - 37
  • [4] An Efficient and Secure Authentication Scheme using Markov Chain for Wireless Sensor Networks
    Singh, Deepti
    Kumar, Bijendra
    Singh, Samayveer
    Chand, Satish
    PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 33 - 38
  • [5] A secure and efficient user authentication protocol for wireless sensor network
    Kumar, Devender
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) : 27131 - 27154
  • [6] A secure and efficient user authentication protocol for wireless sensor network
    Devender Kumar
    Multimedia Tools and Applications, 2021, 80 : 27131 - 27154
  • [7] An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
    Moghadam, Mostafa Farhadi
    Nikooghadam, Mahdi
    Al Jabban, Maytham Azhar Baqer
    Alishahi, Mohammad
    Mortazavi, Leili
    Mohajerzadeh, Amirhossein
    IEEE ACCESS, 2020, 8 : 73182 - 73192
  • [8] Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    Lee, Chin -Wen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 249 - 257
  • [9] A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
    Li, Chun-Ta
    Weng, Chi-Yao
    Chen, Chin-Ling
    Lee, Cheng-Chi
    INTERNET OF VEHICLES: TECHNOLOGIES AND SERVICES TOWARDS SMART CITY (IOV 2018), 2018, 11253 : 278 - 288
  • [10] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)