A provably secure authenticated key agreement protocol for industrial sensor network system

被引:0
|
作者
Thakur, Garima [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Sharma, Piyush [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[3] Univ Sci & Technol Beijing, Jordan & Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur, Tamil Nadu, India
[5] Amity Univ, Sch Engn, Noida, Uttar Pradesh, India
来源
关键词
authentication; elliptic curve cryptography; industrial internet of things; key agreement; security; 2-FACTOR USER AUTHENTICATION; SCHEME; EXCHANGE;
D O I
10.1002/cpe.8250
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The convergence of reliable and self-organizing characteristics of Wireless Sensor Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios such as healthcare, industrial units, battlefield monitoring and so forth, yet has also led to significant security risks in their deployment. So, several researchers are developing efficient authentication frameworks with various security and privacy characteristics for WSNs. Subsequently, we review and examine a recently proposed robust key management protocol for an industrial sensor network system. However, their work is incompetent to proffer expedient security and is susceptible to several security attacks. We demonstrate their vulnerabilities against man-in-the-middle attacks, privileged insider attacks, secret key leakage attacks, user, gateway, and sensor node impersonation attacks, and offline password-guessing attacks. We further highlight the design flaw of no session key agreement in Itoo et al. Therefore to alleviate the existing security issues, we devise an improved key agreement and mutual authentication framework. Our protocol outperforms Itoo et al.'s drawbacks, as demonstrated by the comprehensive security proof performed using the real-or-random (ROR) model and the formal verification accomplished using the Automated Validation of Internet Security Protocols (AVISPA) tool.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [2] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [3] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [4] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    [J]. 2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [5] MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol
    Liu, Xiaoxue
    Li, Yanping
    Qu, Juan
    Jiang, Qi
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 669 - 677
  • [6] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [7] A secure authenticated key agreement protocol
    Popescu, C
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [8] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [9] Provably secure and password-authenticated quantum key agreement protocol with dynamic basis
    Liu, Tianhua
    Meng, Yanlin
    Zhu, Hongfeng
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2018, 9 (03): : 651 - 660
  • [10] A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT
    Chen, Chien-Ming
    Liu, Shuangshuang
    Li, Xuanang
    Islam, S. K. Hafizul
    Das, Ashok Kumar
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 136