An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

被引:337
|
作者
Farash, Mohammad Sabzinejad [1 ]
Turkanovic, Muhamed [2 ]
Kumari, Saru [3 ]
Hoelbi, Marko [2 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[2] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
[3] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
关键词
Internet of Things; Wireless sensor networks; Key agreement; Authentication; BAN-logic; AVISPA tools; MUTUAL AUTHENTICATION; SECURITY; PROTOCOL; ATTACKS;
D O I
10.1016/j.adhoc.2015.05.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working on new techniques and efficient approaches on how to integrate WSN better into the IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanovic et al.'s proposed a highly efficient and novel user authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the JOT notion. Their scheme presented a novel approach where a user from the JOT can authenticate with a specific sensor node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfortunately we have found that Turkanovic et al.'s scheme has some security shortcomings and is susceptible to some cryptographic attacks. This paper focuses on overcoming the security weaknesses of Turkanovic et al.'s scheme, by proposing a new and improved UAKAS. The proposed scheme enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools confirm the security properties of the proposed scheme. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:152 / 176
页数:25
相关论文
共 50 条
  • [1] Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment
    Jangirala, Srinivas
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    [J]. INFORMATION SYSTEMS SECURITY, 2016, 10063 : 45 - 65
  • [2] A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
    Chen, Yuwen
    Martinez, Jose-Fernan
    Castillejo, Pedro
    Lopez, Lourdes
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [3] A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
    Chen, Yuwen
    Lopez, Lourdes
    Martinez, Jose-Fernan
    Castillejo, Pedro
    [J]. JOURNAL OF SENSORS, 2018, 2018
  • [4] A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    Turkanovic, Muhamed
    Brumen, Bostjan
    Hoelbl, Marko
    [J]. AD HOC NETWORKS, 2014, 20 : 96 - 112
  • [5] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465
  • [6] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    [J]. Wireless Personal Communications, 2016, 89 : 447 - 465
  • [7] An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
    Tyagi, Pooja
    Kumari, Saru
    Alzahrani, Bander A.
    Gupta, Anshay
    Yang, Ming-Hour
    [J]. SENSORS, 2022, 22 (22)
  • [8] Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
    Singh, Akansha
    Awasthi, Amit K.
    Singh, Karan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1881 - 1898
  • [9] Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network
    Akansha Singh
    Amit K. Awasthi
    Karan Singh
    [J]. Wireless Personal Communications, 2017, 94 : 1881 - 1898
  • [10] An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
    Moghadam, Mostafa Farhadi
    Nikooghadam, Mahdi
    Al Jabban, Maytham Azhar Baqer
    Alishahi, Mohammad
    Mortazavi, Leili
    Mohajerzadeh, Amirhossein
    [J]. IEEE ACCESS, 2020, 8 : 73182 - 73192