A novel two-factor multi-gateway authentication protocol for WSNs

被引:8
|
作者
Chen, Chen [1 ,2 ]
Guo, Hua [1 ,2 ]
Wu, Yapeng [1 ]
Gao, Ya [3 ]
Liu, Jianwei [1 ]
机构
[1] Minist Ind & Informat Technol, Key Lab Aerosp Network Secur, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100000, Peoples R China
[3] Beijing Res Inst Telemetry, Beijing 100094, Peoples R China
基金
北京市自然科学基金; 国家重点研发计划; 中国国家自然科学基金;
关键词
Authentication and key agreement protocol; Wireless sensor networks; Multi-gateway; Password and identity guessing attack; Forward security; ECC; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; EFFICIENT USER AUTHENTICATION; MUTUAL AUTHENTICATION; 3-FACTOR AUTHENTICATION; SECURE; INTERNET; LIGHTWEIGHT; EXCHANGE;
D O I
10.1016/j.adhoc.2023.103089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With Wireless Sensor Networks(WSNs) rapid development, it is a hot topic that designing a secure and effective authentication protocol to guarantee the safety of WSNs. Many two-factor multi-gateway authentication protocols have been proposed for WSNs. However, almost all the known protocols were found insecure. Especially, all the existing two-factor multi-gateway authentication protocols cannot resist the password and identity(ID) guessing together with the smart card loss attack. We present a novel two-factor multi-gateway authentication protocol based on password and smart card in multi-gateway wireless sensor networks in this paper. Thanks to "fuzzy-verifier" and "honeywords" technique, the new protocol can effectively resist the joint password and identity guessing with the smart card loss attack. In addition, key negotiation is based on discrete elliptic curve encryption, which ensures forward security of the protocol and resists sensor capture attack. Subsequently, we use BAN-logic to ensure the authentication is implemented, and the session key is negotiated. Moreover, a formal security proof of the new protocol based on the game sequence is conducted in Random Oracle model (RO model). Finally, we compare our work with other schemes in the same field in terms of security, communication efficiency and computational efficiency.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Lightweight Certificateless Two-Factor Authentication Protocol Using Smart Cards
    Zheng, Wenying
    Gui, Ziyuan
    Liu, Dengzhi
    Li, Xiong
    Chen, Bing
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2226 - 2233
  • [22] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [23] Efficient Two-Factor Authentication Protocol Using Password and Smart Card
    Liu, Fenghua
    JOURNAL OF COMPUTERS, 2013, 8 (12) : 3257 - 3263
  • [24] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu ZHOU
    Chunpeng GE
    Chunhua SU
    ScienceChina(InformationSciences), 2020, 63 (03) : 34 - 48
  • [25] An anonymous two-factor authentication protocol for IoT-based applications
    Sadri, Mohammad Javad
    Asaar, Maryam Rajabzadeh
    COMPUTER NETWORKS, 2021, 199 (199)
  • [26] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Zhou, Lu
    Ge, Chunpeng
    Su, Chunhua
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [27] Two-Factor User Authentication in Multi-Server Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Fang, Chun-I
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 261 - 268
  • [28] A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices
    Wan, Tao
    Ge, Jingjing
    Liao, Weichuan
    Zhao, Haixia
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (02) : 921 - 945
  • [29] Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
    Jiang, Qi
    Zhang, Xin
    Zhang, Ning
    Tian, Youliang
    Ma, Xindi
    Ma, Jianfeng
    2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [30] Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments
    Xu, Zhiqiang
    He, Debiao
    Huang, Xinyi
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 595 - 605