A novel two-factor multi-gateway authentication protocol for WSNs

被引:8
|
作者
Chen, Chen [1 ,2 ]
Guo, Hua [1 ,2 ]
Wu, Yapeng [1 ]
Gao, Ya [3 ]
Liu, Jianwei [1 ]
机构
[1] Minist Ind & Informat Technol, Key Lab Aerosp Network Secur, Beijing 100191, Peoples R China
[2] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100000, Peoples R China
[3] Beijing Res Inst Telemetry, Beijing 100094, Peoples R China
基金
北京市自然科学基金; 国家重点研发计划; 中国国家自然科学基金;
关键词
Authentication and key agreement protocol; Wireless sensor networks; Multi-gateway; Password and identity guessing attack; Forward security; ECC; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; EFFICIENT USER AUTHENTICATION; MUTUAL AUTHENTICATION; 3-FACTOR AUTHENTICATION; SECURE; INTERNET; LIGHTWEIGHT; EXCHANGE;
D O I
10.1016/j.adhoc.2023.103089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With Wireless Sensor Networks(WSNs) rapid development, it is a hot topic that designing a secure and effective authentication protocol to guarantee the safety of WSNs. Many two-factor multi-gateway authentication protocols have been proposed for WSNs. However, almost all the known protocols were found insecure. Especially, all the existing two-factor multi-gateway authentication protocols cannot resist the password and identity(ID) guessing together with the smart card loss attack. We present a novel two-factor multi-gateway authentication protocol based on password and smart card in multi-gateway wireless sensor networks in this paper. Thanks to "fuzzy-verifier" and "honeywords" technique, the new protocol can effectively resist the joint password and identity guessing with the smart card loss attack. In addition, key negotiation is based on discrete elliptic curve encryption, which ensures forward security of the protocol and resists sensor capture attack. Subsequently, we use BAN-logic to ensure the authentication is implemented, and the session key is negotiated. Moreover, a formal security proof of the new protocol based on the game sequence is conducted in Random Oracle model (RO model). Finally, we compare our work with other schemes in the same field in terms of security, communication efficiency and computational efficiency.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    Mishra, Dheerendra
    AD HOC NETWORKS, 2017, 54 : 147 - 169
  • [32] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
  • [33] The Case for Mobile Two-Factor Authentication
    DeFigueiredo, Dimitri
    IEEE SECURITY & PRIVACY, 2011, 9 (05) : 81 - 85
  • [34] On the (In)Security of Mobile Two-Factor Authentication
    Dmitrienko, Alexandra
    Liebchen, Christopher
    Rossow, Christian
    Sadeghi, Ahmad-Reza
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
  • [35] The Trouble with SMS Two-Factor Authentication
    Kugler, Logan
    COMMUNICATIONS OF THE ACM, 2019, 62 (06) : 14 - 14
  • [36] Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
    Xu, Guangquan
    Ren, Yuanyuan
    Han, Yuanbin
    Li, Xiaohong
    Feng, Zhiyong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2019 - 2026
  • [37] Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
    Chen, Chien-Ming
    Li, Zhen
    Chaudhry, Shehzad Ashraf
    Li, Long
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] A Secured Two-Factor Authentication Protocol for One-Time Money Account
    Sarang, Devidas
    Shekokar, Narendra
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, ICWICOM 2017, 2018, 19 : 29 - 38
  • [39] Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol
    Xie, Qi
    Dong, Na
    Wong, Duncan S.
    Hu, Bin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 478 - 487
  • [40] Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
    Chen, Chien-Ming
    Liu, Shuangshuang
    Li, Xuanang
    Kumari, Saru
    Li, Long
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022