SAPWSN: A Secure Authentication Protocol for Wireless Sensor Networks

被引:13
|
作者
Darbandeh, Foroozan Ghosairi [1 ]
Safkhani, Masoumeh [2 ]
机构
[1] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran 1678815811, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, POB 19395-5746, Tehran, Iran
关键词
WSN; EPC Class 1 Gen-2; Authentication; Privacy; Backward security contradiction attack; The Scyther Compromise-0; 9; 2; tool; RFID MUTUAL AUTHENTICATION; QUADRATIC RESIDUES; PRIVACY PROTECTION; SCHEME;
D O I
10.1016/j.comnet.2022.109469
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of RFID systems, there is a need for secure RFID authentication that can provide security against a variety of attacks, so designing a perfectly safe protocol has become a security challenge. The most remarkable security challenges may be information leakage, traceability, and tag impersonation. Several researchers have attempted to address this security demand by proposing ultra-lightweight solutions that use only very low-cost operations such as bit-wise operations. However, approximately all of the presented previous ultra-lightweight authentication schemes are vulnerable to a variety of attacks. For this purpose, Chiou and Chang recently proposed an EPC Class 1 Gen-2-based RFID authentication protocol and claimed it is resistant against replay attacks and also other known active and passive attacks. They also stated that their proposed protocol does not require features such as a secure channel, time parameters, or virtual IDs. In this paper, we will investigate the security of the Chiou and Chang authentication scheme and demonstrate that it is completely insecure. Specifically, we will present the security faults of this scheme. In addition, we will present an enhanced protocol called SAPWSN. The proposed protocol presents precise authentication and highly secure transfers. We demonstrate the proposed protocol's security in the formal and informal methods. In the formal method, we use the Compromise version of Scyther tool.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Provable Secure Node Authentication Protocol for Wireless Sensor Networks
    Zhimeng, Liu
    Yanli, Zhao
    [J]. Proceedings - 13th Web Information Systems and Applications Conference, WISA 2016 - In conjunction with 1st Symposium on Big Data Processing and Analysis, BDPA 2016 and 1st Workshop on Information System Security, ISS 2016, 2017, : 221 - 224
  • [2] A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3808 - 3819
  • [3] Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
    Yu, SungJin
    Lee, JoonYoung
    Lee, KyungKeun
    Park, KiSung
    Park, YoungHo
    [J]. SENSORS, 2018, 18 (10)
  • [4] Secure and efficient mutual user authentication protocol for wireless sensor networks
    Yang, Qinghua
    Wang, Liejun
    Liu, Qi
    Wang, Mingwei
    [J]. Journal of Software Engineering, 2014, 8 (03): : 184 - 193
  • [5] A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks
    Yu, SungJin
    YoungLee, Joon
    Kim, MyeongHyun
    Park, YoungHo
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 830 - 834
  • [6] A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks
    Bruce, Ndibanje
    Lee, Hoon Jae
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 52 - 59
  • [7] The Design of a Secure Three Factor Authentication Protocol for Wireless Sensor Networks
    Babu, Naresh M.
    Chakravarthy, A. S. N.
    Ravindranath, C.
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 184 - 190
  • [8] Secure and efficient mutual user authentication protocol for wireless sensor networks
    [J]. Wang, Liejun, 1600, Academic Journals Inc. (08):
  • [9] Secure password authentication protocol in wireless networks
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 149 - +
  • [10] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, A.L.
    [J]. World Academy of Science, Engineering and Technology, 2010, 42 : 630 - 636