A provably secure authenticated key agreement protocol for industrial sensor network system

被引:0
|
作者
Thakur, Garima [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Sharma, Piyush [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[3] Univ Sci & Technol Beijing, Jordan & Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur, Tamil Nadu, India
[5] Amity Univ, Sch Engn, Noida, Uttar Pradesh, India
来源
关键词
authentication; elliptic curve cryptography; industrial internet of things; key agreement; security; 2-FACTOR USER AUTHENTICATION; SCHEME; EXCHANGE;
D O I
10.1002/cpe.8250
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The convergence of reliable and self-organizing characteristics of Wireless Sensor Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios such as healthcare, industrial units, battlefield monitoring and so forth, yet has also led to significant security risks in their deployment. So, several researchers are developing efficient authentication frameworks with various security and privacy characteristics for WSNs. Subsequently, we review and examine a recently proposed robust key management protocol for an industrial sensor network system. However, their work is incompetent to proffer expedient security and is susceptible to several security attacks. We demonstrate their vulnerabilities against man-in-the-middle attacks, privileged insider attacks, secret key leakage attacks, user, gateway, and sensor node impersonation attacks, and offline password-guessing attacks. We further highlight the design flaw of no session key agreement in Itoo et al. Therefore to alleviate the existing security issues, we devise an improved key agreement and mutual authentication framework. Our protocol outperforms Itoo et al.'s drawbacks, as demonstrated by the comprehensive security proof performed using the real-or-random (ROR) model and the formal verification accomplished using the Automated Validation of Internet Security Protocols (AVISPA) tool.
引用
下载
收藏
页数:24
相关论文
共 50 条
  • [11] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    Islam, S. K. Hafizul
    Singh, Abhishek
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 879 - 898
  • [12] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    SK Hafizul Islam
    Abhishek Singh
    Wireless Personal Communications, 2015, 85 : 879 - 898
  • [13] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [14] Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga
    Das, Ashok Kumar
    Wazid, Mohammad
    Conti, Mauro
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1900 - 1910
  • [15] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [16] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [17] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    Chinese Journal of Electronics, 2015, 24 (02) : 332 - 337
  • [18] An Efficient Provably Secure Password-Based Authenticated Key Agreement
    Xu, Hanqiu
    Wang, Qingping
    Zhou, Jing
    Ruan, Ou
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 423 - 434
  • [19] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, SK Hafizul
    Journal of Information Security and Applications, 2020, 52
  • [20] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, S. K. Hafizul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52