WSN node access authentication protocol based on trusted computing

被引:10
|
作者
Liu, Jing [1 ,2 ]
Liu, Lihui [1 ]
Liu, Zenghui [3 ]
Lai, Yingxu [1 ,2 ]
Qin, Hua [1 ,2 ]
Luo, Shiyao [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Minist Educ, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
[3] Beijing Polytech, Inst Electromech Engn, Beijing 100176, Peoples R China
关键词
Authentication protocol; Trusted connection architecture; Wireless sensor networks; Syverson-Van Oorschot (SVO); Automated Validation of Internet Security Protocols and Applications (AVISPA); KEY AGREEMENT PROTOCOL;
D O I
10.1016/j.simpat.2022.102522
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architecture to prevent easy node capture and various malicious attacks as well as to address the limited energy and computing power and different levels of node credibility in WSNs. First, each node of a WSN is configured using a trusted platform module to ensure complete key generation and safe storage, and thus provides security for the access protocol. Second, an alarm mechanism is introduced to avoid cluster node issues, such as not forwarding data, forwarding part of the data, and forwarding wrong data. This mechanism enhances the troubleshooting capability. Finally, during node access, bidirectional node identity authentication, platform identity authentication, and platform integrity verification are performed to achieve trusted node access. Our protocol is formally verified using Syverson-Van Oorschot (SVO) logic. The security features are applied to analyze the protocol, and back-end analysis modules such as On-the-fly Model-Checker (OFMC) and Constraint Logic based Attack Searcher (CL-AtSe) of the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool are used to test the protocol. The theoretical analysis and test results show that the established security target of the protocol can resist network attacks in real application scenarios. In addition, the implementation efficiency of the protocol is sufficiently analyzed and evaluated. The results show that the protocol has high execution efficiency. In particular, the protocol is suitable for WSNs with high security requirements and limited computing power.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT
    Wang, Qian
    Chen, Wenxia
    Wang, Lei
    [J]. INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (02) : 234 - 240
  • [2] An access authentication protocol for trusted handoff in wireless mesh networks
    Xiao, Peng
    He, Jingsha
    Fu, Yingfang
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 480 - 488
  • [3] A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT
    Qian Wang
    Wenxia Chen
    Lei Wang
    [J]. International Journal of Wireless Information Networks, 2020, 27 : 234 - 240
  • [4] Design and analysis on trusted network equipment access authentication protocol
    Lai, Yingxu
    Chen, Yinong
    Zou, Qichen
    Liu, Zenghui
    Yang, Zhen
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 157 - 169
  • [5] Lite-IDE based Hirearchical Node Authentication Protocol for Energy Efficient in WSN
    Cho, Youngbok
    Lee, Sangho
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 644 - 647
  • [6] A Switching Authentication Protocol of Terminal Node for Fog Computing
    Hu Ronglei
    Chen Lei
    Duan Xiaoyi
    Yu Bingqi
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2350 - 2356
  • [7] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [8] Trusted Network Access Authentication Scheme Based on the Label
    Wang, Yu
    Duan, Yu
    Wang, Fei
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 123 - 130
  • [9] Study on Access Control Based on Trusted Computing
    Ma, Xinqiang
    Huang, Yi
    Bo Lv
    [J]. MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +
  • [10] Mutual Entity Authentication Protocol Based on ECDSA for WSN
    Moon, Ayaz Hassan
    Iqbal, Ummer
    Bhat, G. Mohiuddin
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 187 - 192