A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things

被引:62
|
作者
Shin, Sooyeon [1 ]
Kwon, Taekyoung [1 ]
机构
[1] Yonsei Univ, Grad Sch Informat, Seoul 03722, South Korea
关键词
Wireless sensor networks; Authentication; Sensors; Authorization; 5G mobile communication; Internet of Things; Three-factor authentication; authorization; key agreement; elliptic curve cryptography; anonymity; untraceability; 5G network; wireless sensor networks; the~Internet of Things; ELLIPTIC-CURVE CRYPTOGRAPHY; USER AUTHENTICATION; 3-FACTOR AUTHENTICATION; SECURITY; PROTOCOL; IMPLEMENTATION; LIGHTWEIGHT;
D O I
10.1109/ACCESS.2020.2985719
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have played an important role in the Internet of Things (IoT), and the 5G network is being considered as a major candidate for IoT & x2019;s communication network with the advent of 5G commercialization. The potential of integrating WSNs and 5G in the IoT is expected to allow IoT to penetrate deeply into our daily lives and to provide various services that are convenient, but at the same time, it also brings new security threats. From this aspect, user authentication and key agreement are essential for secure end-to-end communication. As IoT devices, including sensors, collect and process more and more personal information, both anonymous authentication and authorization are also required to protect the privacy and to prevent anyone without privileges from accessing private data. Recently, Adavoudi-Jolfaei <italic>et al.</italic> proposed an anonymous three-factor authentication and access control scheme for real-time applications in WSNs. However, we found that this scheme does not provide sensor-node anonymity and suffers from user collusion and desynchronization attacks. In this paper, we introduce a system architecture by considering the integration of WSNs and 5G for IoT. Based on a cryptanalysis of Adavoudi-Jolfaei <italic>et al.</italic>& x2019;s scheme and the system architecture, we propose an elliptic curve cryptography (ECC)-based privacy-preserving authentication, authorization, and key agreement scheme for WSNs in 5G-integrated IoT. We conduct a formal and informal security analysis in order to demonstrate that the proposed scheme withstands various security attacks and guarantees all desired security features, overcoming the drawbacks of Adavoudi-Jolfaei <italic>et al.</italic>& x2019;s scheme. Finally, a performance and comparative analysis with the related schemes indicate that the proposed scheme is both efficient and more secure.
引用
收藏
页码:67555 / 67571
页数:17
相关论文
共 50 条
  • [31] Privacy-preserving internet of things data filtering scheme
    Zhou, Rang
    Zhang, Xiaosong
    Wang, Xiaofen
    Li, Dongfen
    Chen, Tao
    Zhang, Xiaojun
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 45 - 53
  • [32] A Privacy-Preserving Homomorphic Encryption Scheme for the Internet of Things
    Zouari, Jaweher
    Hamdi, Mohamed
    Kim, Tai-Hoon
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1939 - 1944
  • [33] In the Digital Age of 5G Networks: Seamless Privacy-Preserving Authentication for Cognitive-Inspired Internet of Medical Things
    Deebak, B. D.
    Memon, Fida Hussain
    Khowaja, Sunder Ali
    Dev, Kapal
    Wang, Weizheng
    Qureshi, Nawab Muhammad Faseeh
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 8916 - 8923
  • [34] Secure authentication and privacy-preserving blockchain for industrial internet of things
    Sharma, Prakash Chandra
    Mahmood, Md Rashid
    Raja, Hiral
    Yadav, Narendra Singh
    Gupta, Brij B.
    Arya, Varsha
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [35] Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks
    Khan, Haibat
    Dowling, Benjamin
    Martin, Keith M.
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1064 - 1069
  • [36] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Vanga Odelu
    Sherali Zeadally
    Ashok Kumar Das
    Mohammad Wazid
    Debiao He
    [J]. Telecommunication Systems, 2018, 69 : 431 - 445
  • [37] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Odelu, Vanga
    Zeadally, Sherali
    Das, Ashok Kumar
    Wazid, Mohammad
    He, Debiao
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 69 (04) : 431 - 445
  • [38] MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks
    Lin, Xiaodong
    Lu, Rongxing
    Shen, Xuemin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (06): : 843 - 856
  • [39] A user authentication and key agreement scheme for heterogeneous wireless sensor networks
    Yan, Li-Li
    Chang, Yan
    Zhang, Shi-Bin
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60
  • [40] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Xie, Qi
    Li, Keheng
    Tan, Xiao
    Han, Lidong
    Tang, Wen
    Hu, Bin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)