SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network

被引:0
|
作者
Deepti Singh
Bijendra Kumar
Samayveer Singh
Satish Chand
机构
[1] Netaji Subhas Institute of Technology,Division of Computer Engineering
[2] National Institute of Technology Jalandhar,Department of Computer Science and Engineering
[3] Jawaharlal Nehru University,School of Computer and Systems Sciences
来源
Wireless Personal Communications | 2019年 / 107卷
关键词
User authentication; MAC function; Session key; Security and privacy;
D O I
暂无
中图分类号
学科分类号
摘要
User authentication is an elementary security prerequisite in resource-constrained wireless sensor networks (WSNs). Recently, Amin et al. presented an anonymity preserving authentication scheme for WSN which is secure against both active and passive attacks. In this paper, we first cryptanalyzed Amin et al. scheme and find that it suffers from the password guessing, impersonation, session key leakage attacks. To address these deficiencies, we propose a secure authentication scheme for wireless sensor network (SMAC-AS) by using MAC function. It additionally uses symmetric encryption and decryption operations for authentication to prevent forgery. We use OTCODE as one time activation code that is more secure than password. The SMAC-AS is a low cost and much faster in practice because it uses light weight MAC function and symmetric operations. Decryption of MAC is not easy. Moreover, SMAC-AS also helps in faster and efficient transmission of the message because of the lightweight function and operations which leads to saving the battery of the sensor nodes. We use BAN logic for authentication proof. The formal security analysis using random oracle model is done to show its efficacy.
引用
收藏
页码:1289 / 1308
页数:19
相关论文
共 50 条
  • [31] SMASG: Secure Mobile Authentication Scheme for Global Mobility Network
    Ryu, Jihyeon
    Lee, Hakjun
    Lee, Youngsook
    Won, Dongho
    IEEE ACCESS, 2022, 10 : 26907 - 26919
  • [32] Cryptanalysis of "A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks"
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 312 - 317
  • [33] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [34] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    A. Jabbari
    J. B. Mohasefi
    Wireless Personal Communications, 2021, 116 : 2565 - 2591
  • [35] A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks
    Fan, Qing
    Chen, Jianhua
    Xu, Feng
    Li, Li
    Luo, Min
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16)
  • [36] RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks
    Singh D.
    Kumar B.
    Singh S.
    Chand S.
    Singh P.K.
    Personal and Ubiquitous Computing, 2024, 28 (01) : 171 - 192
  • [37] An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks
    Zhou, Xiancun
    Xiong, Yan
    INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 266 - 273
  • [38] An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    Hsiao, Tsung-Chih
    Liao, Yu-Ting
    Huang, Jen-Yan
    Chen, Tzer-Shyong
    Horng, Gwo-Boa
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3649 - 3664
  • [39] An improved dynamic user authentication scheme for wireless sensor networks
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 986 - 990
  • [40] Robust Dynamic User Authentication Scheme for Wireless Sensor Networks
    Vaidya, Binod
    Silva, Jorge Sa
    Rodrigues, Joel J. P. C.
    Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 88 - 91