A novel two-factor multi-gateway authentication protocol for WSNs

被引:8
|
作者
Chen, Chen [1 ,2 ]
Guo, Hua [1 ,2 ]
Wu, Yapeng [1 ]
Gao, Ya [3 ]
Liu, Jianwei [1 ]
机构
[1] Minist Ind & Informat Technol, Key Lab Aerosp Network Secur, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100000, Peoples R China
[3] Beijing Res Inst Telemetry, Beijing 100094, Peoples R China
基金
北京市自然科学基金; 国家重点研发计划; 中国国家自然科学基金;
关键词
Authentication and key agreement protocol; Wireless sensor networks; Multi-gateway; Password and identity guessing attack; Forward security; ECC; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; EFFICIENT USER AUTHENTICATION; MUTUAL AUTHENTICATION; 3-FACTOR AUTHENTICATION; SECURE; INTERNET; LIGHTWEIGHT; EXCHANGE;
D O I
10.1016/j.adhoc.2023.103089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With Wireless Sensor Networks(WSNs) rapid development, it is a hot topic that designing a secure and effective authentication protocol to guarantee the safety of WSNs. Many two-factor multi-gateway authentication protocols have been proposed for WSNs. However, almost all the known protocols were found insecure. Especially, all the existing two-factor multi-gateway authentication protocols cannot resist the password and identity(ID) guessing together with the smart card loss attack. We present a novel two-factor multi-gateway authentication protocol based on password and smart card in multi-gateway wireless sensor networks in this paper. Thanks to "fuzzy-verifier" and "honeywords" technique, the new protocol can effectively resist the joint password and identity guessing with the smart card loss attack. In addition, key negotiation is based on discrete elliptic curve encryption, which ensures forward security of the protocol and resists sensor capture attack. Subsequently, we use BAN-logic to ensure the authentication is implemented, and the session key is negotiated. Moreover, a formal security proof of the new protocol based on the game sequence is conducted in Random Oracle model (RO model). Finally, we compare our work with other schemes in the same field in terms of security, communication efficiency and computational efficiency.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments
    Lee, JoonYoung
    Yu, SungJin
    Park, KiSung
    Park, YoHan
    Park, YoungHo
    SENSORS, 2019, 19 (10):
  • [2] A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks
    Guo, Hua
    Gao, Ya
    Xu, Tongge
    Zhang, Xiyong
    Ye, Jianfeng
    AD HOC NETWORKS, 2019, 95
  • [3] Two-factor authentication for the Bitcoin protocol
    Christopher Mann
    Daniel Loebenberger
    International Journal of Information Security, 2017, 16 : 213 - 226
  • [4] Two-factor authentication for the Bitcoin protocol
    Mann, Christopher
    Loebenberger, Daniel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (02) : 213 - 226
  • [5] Two-Factor Authentication for the Bitcoin Protocol
    Mann, Christopher
    Loebenberger, Daniel
    SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 155 - 171
  • [6] An Improved User Identity Authentication Protocol for Multi-Gateway Wireless Sensor Networks
    Cao, Liling
    Zhang, Yu
    Liang, Mei
    Cao, Shouqi
    International Journal of Network Security, 2022, 24 (04) : 713 - 726
  • [7] Multi-factor User Authentication Scheme for Multi-gateway Wireless Sensor Networks
    Wang C.-Y.
    Wang D.
    Wang F.-F.
    Xu G.-A.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (04): : 683 - 700
  • [8] Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs
    Yang, Ting
    Zhai, Feng
    Xu, HaiQing
    Li, Wei
    ENERGY REPORTS, 2022, 8 : 1200 - 1211
  • [9] Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol
    Georgescu, Adela
    INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14, 2014, 299 : 495 - 504
  • [10] Two-factor remote authentication protocol and BAN Analysis
    Zhang, Lihua
    Bai, Erfei
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 411 - 414