An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

被引:337
|
作者
Farash, Mohammad Sabzinejad [1 ]
Turkanovic, Muhamed [2 ]
Kumari, Saru [3 ]
Hoelbi, Marko [2 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
[2] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
[3] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
关键词
Internet of Things; Wireless sensor networks; Key agreement; Authentication; BAN-logic; AVISPA tools; MUTUAL AUTHENTICATION; SECURITY; PROTOCOL; ATTACKS;
D O I
10.1016/j.adhoc.2015.05.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working on new techniques and efficient approaches on how to integrate WSN better into the IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanovic et al.'s proposed a highly efficient and novel user authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the JOT notion. Their scheme presented a novel approach where a user from the JOT can authenticate with a specific sensor node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfortunately we have found that Turkanovic et al.'s scheme has some security shortcomings and is susceptible to some cryptographic attacks. This paper focuses on overcoming the security weaknesses of Turkanovic et al.'s scheme, by proposing a new and improved UAKAS. The proposed scheme enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools confirm the security properties of the proposed scheme. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:152 / 176
页数:25
相关论文
共 50 条
  • [31] A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things
    Xu, Zisang
    Xu, Cheng
    Liang, Wei
    Xu, Jianbo
    Chen, Haixian
    [J]. IEEE ACCESS, 2019, 7 : 53922 - 53931
  • [32] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    [J]. SENSORS, 2017, 17 (03)
  • [33] An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks
    Jung, Jaewook
    Kim, Jiye
    Choi, Younsung
    Won, Dongho
    [J]. SENSORS, 2016, 16 (08)
  • [34] An Efficient Mutual Authentication and Symmetric Key Agreement Scheme for Wireless Body Area Network
    Chunka, Chukhu
    Banerjee, Subhasish
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 8457 - 8473
  • [35] An Efficient Mutual Authentication and Symmetric Key Agreement Scheme for Wireless Body Area Network
    Chukhu Chunka
    Subhasish Banerjee
    [J]. Arabian Journal for Science and Engineering, 2021, 46 : 8457 - 8473
  • [36] A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things
    Shin, Sooyeon
    Kwon, Taekyoung
    [J]. IEEE ACCESS, 2020, 8 : 67555 - 67571
  • [37] User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context
    Mostefa, Benfilali
    Abdelkader, Gafour
    Mohamed, Belghachi
    [J]. JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2024, 20 (02) : 186 - 197
  • [38] An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. SENSORS, 2016, 16 (06)
  • [39] LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network
    Soni, Mukesh
    Singh, Dileep Kumar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1067 - 1084
  • [40] An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter
    Wang, Jiuru
    Wang, Haifeng
    Wang, Xu An
    Cao, Yunpeng
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 815 - 820