A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion

被引:72
|
作者
Wu, Fan [1 ]
Li, Xiong [2 ]
Xu, Lili [3 ]
Vijayakumar, Pandi [4 ]
Kumar, Neeraj [5 ,6 ,7 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Inst Cyber Secur, Chengdu 611731, Peoples R China
[3] Xiamen Univ, Sch Informat, Xiamen 361005, Peoples R China
[4] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[5] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[6] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[7] King Abdulaziz Univ, Jeddah, Saudi Arabia
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 01期
关键词
Wireless sensor networks; Authentication; Biometrics (access control); Password; Protocols; Computer science; three-factor authentication; NS-3; wireless sensor network (WSN); proverif;
D O I
10.1109/JSYST.2020.2981049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an important topic of IoT, wireless sensor network (WSN) data transmission is popular nowadays. It is widely accepted that the wireless channel is hazard, and multifactor authentication schemes are proposed to save the hazard of wireless communication circumstance. To overcome the problems, we give a fresh three-factor authentication scheme providing session keys for WSNs. Formal verification given by Proverif illustrates that the new scheme keeps security properties. At the same time, the informal analysis also denotes that the proposed scheme is practical and satisfies general needs, such as counteraction against various attacks and meeting security properties. Compared to some recent similar schemes, the proposed scheme performs better in security and is suitable for application. At last, we use NS-3 for simulation. The results from the simulation show that the scheme can run in IoT environment normally and has practical perspective.
引用
收藏
页码:1120 / 1129
页数:10
相关论文
共 50 条
  • [31] A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT
    Liu, Zhenhua
    Guo, Changbo
    Wang, Baocang
    [J]. IEEE ACCESS, 2020, 8 : 195914 - 195928
  • [32] A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
    Li, Xiong
    Peng, Jieyao
    Obaidat, Mohammad S.
    Wu, Fan
    Khan, Muhammad Khurram
    Chen, Chaoyang
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 39 - 50
  • [33] A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
    Mo, Jiaqing
    Hu, Zhongwang
    Shen, Wei
    [J]. IEEE ACCESS, 2022, 10 : 12137 - 12152
  • [34] Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks
    Nyangaresi, Vincent Omollo
    [J]. AD HOC NETWORKS, 2023, 142
  • [35] A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
    Yu, SungJin
    Lee, JoonYoung
    Park, YoHan
    Park, YoungHo
    Lee, SangWoo
    Chung, BoHeung
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [36] An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
    Wang, Chenyu
    Xu, Guoai
    Sun, Jing
    [J]. SENSORS, 2017, 17 (12)
  • [37] Security analysis of a three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
    Tai, Wei-Liang
    Chang, Ya-Fen
    Hou, Po-Lin
    [J]. International Journal of Network Security, 2019, 21 (06) : 1014 - 1020
  • [38] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [39] Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
    Park, YoHan
    Park, YoungHo
    [J]. SENSORS, 2016, 16 (12)
  • [40] A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
    Ashok Kumar Das
    [J]. Wireless Personal Communications, 2015, 82 : 1377 - 1404