Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks

被引:50
|
作者
Adavoudi-Jolfaei, AmirHosein [1 ]
Ashouri-Talouki, Maede [1 ]
Aghili, Seyed Farhad [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Dept Informat Technol Engn, Esfahan 8174673441, Iran
关键词
Wireless sensor networks; User anonymity; Three-factor authentication; Key agreement; Access control; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; SECURITY; PROTOCOL; CRYPTANALYSIS; IMPROVEMENT; FRAMEWORK; EFFICIENT;
D O I
10.1007/s12083-017-0627-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) play an important role and support a variety of real time applications, such as healthcare monitoring, military surveillance, vehicular tracking and, so on. Secure and real time information accessing from the sensor nodes in these applications is very important. Because wireless sensor nodes are limited in computing and communication capabilities and data storage, it is very crucial to design an effective and secure lightweight authentication and key agreement scheme. Recently, Gope et al. proposed a realistic lightweight anonymous authentication scheme in WSNs and claimed that their scheme satisfied all security concerns in these networks. However, we show that in their scheme the adversary can obtain the session key between the user and the sensor node. In order to fix this drawback, we propose an improved three-factor authentication scheme which is more suitable than Gope et al.'s scheme and also provides more desired security properties such as three-factor authentication and access control. Through the informal analysis, we show that our scheme is secure against various known attacks including the attack found in Gope et al.'s scheme. Furthermore, we have demonstrated the validity of our proposed scheme using the BAN logic. As compared with the previous authentication schemes, the proposed scheme is not only more secure but also enough practical and competitive with existing schemes.
引用
收藏
页码:43 / 59
页数:17
相关论文
共 50 条
  • [41] Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
    Wang, Ding
    Li, Wenting
    Wang, Ping
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) : 4064 - 4075
  • [42] LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
    Hossein Abdi Nasib Far
    Majid Bayat
    Ashok Kumar Das
    Mahdi Fotouhi
    S. Morteza Pournaghi
    M. A. Doostari
    [J]. Wireless Networks, 2021, 27 : 1389 - 1412
  • [43] LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
    Abdi Nasib Far, Hossein
    Bayat, Majid
    Kumar Das, Ashok
    Fotouhi, Mahdi
    Pournaghi, S. Morteza
    Doostari, M. A.
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1389 - 1412
  • [44] Lightweight anonymous and mutual authentication scheme for wireless body area networks
    Attir, Azeddine
    Nait-Abdesselam, Farid
    Faraoun, Kamel Mohamed
    [J]. COMPUTER NETWORKS, 2023, 224
  • [45] LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Shojafar, Mohammad
    Peris-Lopez, Pedro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 410 - 424
  • [46] A lightweight anonymous two-factor authentication protocol for wireless sensor networks in Internet of Vehicles
    Sadri, Mohammad Javad
    Rajabzadeh Asaar, Maryam
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (14)
  • [47] Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks
    Gao, Guangyong
    Feng, Zhao
    Xia, Zhihua
    [J]. IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2023, 7 (03): : 1297 - 1308
  • [48] Real-time broadcast authentication algorithm for wireless sensor networks
    Wang, Hao
    Fang, Wenjuan
    Zhang, Xiao
    Wang, Ping
    [J]. Journal of Computational Information Systems, 2013, 9 (03): : 1051 - 1059
  • [49] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [50] A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hou, Po-Lin
    Lai, Kuan-Yu
    [J]. SYMMETRY-BASEL, 2021, 13 (07):