An efficient anonymous user authentication and key agreement protocol for wireless sensor networks

被引:8
|
作者
Kumar, Devender [1 ]
Grover, Harmanpreet Singh [2 ]
Kaur, Damandeep [3 ]
Verma, Adarsh [2 ]
Saini, Khushil Kumar [4 ]
Kumar, Bijendra [4 ]
机构
[1] NSUT, Dept Informat Technol, New Delhi, India
[2] NSIT, Dept Comp Engn, New Delhi, India
[3] Ericsson India Global Serv, Dept Business Area Managed Serv, Gurugram, India
[4] NSUT, Dept Comp Sci & Engn, New Delhi, India
关键词
impersonation attack; insider attack; ProVerif; User authentication; wireless sensor networks;
D O I
10.1002/dac.4724
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to fast development of wireless technology, wireless sensor networks (WSNs) are used in many applications such environmental monitoring, health monitoring, and area monitoring. To protect WSNs from various security threats, many user authentication protocols have been proposed. Recently, Gope and Hwang have discussed an authentication protocol for WSNs. Here, we show that their scheme is not resistant to stolen verifier, user impersonation, smart card loss, and insider attacks. Also, it does not maintain secrecy of session key and anonymity of sensor node. Then we devise an efficient user authentication protocol using physically unclonable function (PUF) for WSNs to overcome the limitations of their scheme. We present our protocol's informal security analysis to show that is resistant to various known attacks. Formal security verification and analysis of the proposed protocol are done using ProVerif tool and widely accepted Real-Or-Random (ROR) model, respectively. In the performance analysis, we show that our protocol offers more security features than the others related schemes.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Mir, Omid
    Munilla, Jorge
    Kumari, Saru
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 79 - 91
  • [2] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Omid Mir
    Jorge Munilla
    Saru Kumari
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 79 - 91
  • [3] Efficient user authentication and key agreement in wireless sensor networks
    Juang, Wen-Shenq
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 15 - 29
  • [4] A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
    Mo, Jiaqing
    Chen, Hang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [5] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    [J]. SENSORS, 2017, 17 (03)
  • [6] An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks
    Jung, Jaewook
    Kim, Jiye
    Choi, Younsung
    Won, Dongho
    [J]. SENSORS, 2016, 16 (08)
  • [7] A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks
    Pu, Cong
    Zerkle, Haleigh
    Wall, Andrew
    Lim, Sunho
    Choo, Kim-Kwang Raymond
    Ahmed, Imtiaz
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) : 21136 - 21146
  • [8] An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network
    Zhang, Xin
    Wen, Fengtong
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 201 - 215
  • [9] Anonymous Authentication and Key Agreement Protocol for LTE Networks
    Fan, Chun-, I
    Tseng, Yi-Fan
    Cheng, Chen-Hsi
    Kuo, Hsin-Nan
    Huang, Jheng-Jia
    Shih, Yu-Tse
    [J]. PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 68 - 71
  • [10] A user authentication and key agreement scheme for heterogeneous wireless sensor networks
    Yan, Li-Li
    Chang, Yan
    Zhang, Shi-Bin
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60