A Secure Authentication Mechanism for Wireless Sensor Networks

被引:1
|
作者
Ali, Rifaqat [1 ]
Chandrakar, Preeti [2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ,6 ]
Hsiao, Kuei-Fang [7 ,8 ]
Pal, Arup Kumar [9 ]
Islam, S. K. Hafizul [10 ]
机构
[1] Natl Inst Technol Hamirpur, Dept Math & Sci Comp, Hamirpur 177005, Himachal Prades, India
[2] Natl Inst Technol Raipur, Dept Comp Sci & Engn, Chhattisgarh 492001, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah 27272, U Arab Emirates
[4] Univ Jordan, Korea Adv Inst Sci & Technol, Amman 11942, Jordan
[5] Univ Sci & Technol, Beijing 100083, Peoples R China
[6] Amity Univ, Noida 201313, UP, India
[7] Univ Sharjah, Dept Informat Syst, Sharjah, U Arab Emirates
[8] Ming Chuan Univ, Dept Informat Management, Taipei, Taiwan
[9] Indian Inst Technol ISM Dhanbad, Dept Comp Sci & Engn, Jharkhand 8240064, India
[10] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
关键词
Authentication; Attack; BAN logic; Security; WSNs; KEY AGREEMENT SCHEME; USER AUTHENTICATION; PROTOCOL; EFFICIENT; INTERNET;
D O I
10.1109/cits49457.2020.9232633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Wireless Sensor Networks (WSNs), the sensor nodes are often used to collect the data and send it to the gateway node. This real data are the most important and sensitive. If someone gets this data illegally, then there is no privacy. Thus, user authentication is most precious for securing this data over an insecure channel. To keep this important matter in mind, we have developed a secure authentication mechanism for WSNs. The proposed method is proved through BAN logic, which guarantees mutual authentication and session key agreement securely. The informal security analysis is also executed for the proposed mechanism to show that it resists various wicked attacks. Apart from this, the performance evaluation is also carried out along with other existing schemes in regards of communication and computation costs.
引用
收藏
页码:206 / 213
页数:8
相关论文
共 50 条
  • [1] An Investigation of Secure Authentication Systems in Wireless Sensor Networks
    Vani, Girija
    Shariff, Noorullah C.
    Biradar, Raj Kumar L.
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 4725 - 4733
  • [2] SAPWSN: A Secure Authentication Protocol for Wireless Sensor Networks
    Darbandeh, Foroozan Ghosairi
    Safkhani, Masoumeh
    [J]. COMPUTER NETWORKS, 2023, 220
  • [3] Simple and Secure Node Authentication in Wireless Sensor Networks
    Vardhan, Aishwarya
    Hussain, Muzzammil
    Garimella, Rama Murthy
    [J]. 2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [4] Secure and Efficient Broadcast Authentication in Wireless Sensor Networks
    Kwon, Taekyoung
    Hong, Jin
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (08) : 1120 - 1133
  • [5] Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks
    Jain, Usha
    Hussain, Muzzammil
    Kakarla, Jagadeesh
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (09)
  • [6] Key establishment and authentication mechanism for secure sensor networks
    Doh, I
    Chae, K
    [J]. ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 335 - 344
  • [7] Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
    Yu, SungJin
    Lee, JoonYoung
    Lee, KyungKeun
    Park, KiSung
    Park, YoungHo
    [J]. SENSORS, 2018, 18 (10)
  • [8] Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 188 - 195
  • [9] Provable Secure Node Authentication Protocol for Wireless Sensor Networks
    Zhimeng, Liu
    Yanli, Zhao
    [J]. Proceedings - 13th Web Information Systems and Applications Conference, WISA 2016 - In conjunction with 1st Symposium on Big Data Processing and Analysis, BDPA 2016 and 1st Workshop on Information System Security, ISS 2016, 2017, : 221 - 224
  • [10] A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3808 - 3819