An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

被引:117
|
作者
Wu, Fan [1 ]
Xu, Lili [2 ]
Kumari, Saru [3 ]
Li, Xiong [4 ]
Shen, Jian [5 ]
Choo, Kim-Kwang Raymond [6 ]
Wazid, Mohammad [7 ]
Das, Ashok Kumar [7 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[7] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Prades, India
基金
中国国家自然科学基金;
关键词
Smart card; Sensor capture attack; Wireless sensor network; Multi-gateway; User anonymity; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; SMART CARD; SECURITY; PROTOCOL; ANONYMITY; INTERNET;
D O I
10.1016/j.jnca.2016.12.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide range of industries such as agriculture and military. However, designing a secure and reliable authentication scheme for WSNs that can be deployed in IoT remains a research and operational challenge. For example, recently in 2016, Amin and Biswas showed that the Turcanovic et al.'s scheme is vulnerable to smart card loss attack, user impersonation attack, etc. They then proposed a new authentication scheme for WSNs with multi-gateway. In this paper, we revisit the scheme of Amin and Biswas and reveal previously unknown vulnerabilities in the scheme (i.e. sensor capture attack, user forgery attack, gateway forgery attack, sensor forgery attack and off-line guessing attack). In addition, we demonstrate that the user in the scheme can be tracked due to the use of a constant pseudo-identity and previously established session keys can be calculated by the attacker. Rather than attempting to fix a broken scheme, we present a novel authentication scheme for multi-gateway based WSNs. We then demonstrate the security of the proposed scheme using Proverif, as well as evaluating the good performance of the scheme using NS-2 simulation.
引用
收藏
页码:72 / 85
页数:14
相关论文
共 50 条
  • [1] A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT
    Jen-Ho Yang
    [J]. EURASIP Journal on Information Security, 2023
  • [2] A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT
    Yang, Jen-Ho
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2023, 2023 (01)
  • [3] Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    Mishra, Dheerendra
    [J]. AD HOC NETWORKS, 2017, 54 : 147 - 169
  • [4] A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
    Lili Xu
    Fan Wu
    [J]. Arabian Journal for Science and Engineering, 2019, 44 : 3977 - 3993
  • [5] A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception
    Xu, Lili
    Wu, Fan
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (04) : 3977 - 3993
  • [6] Cryptanalysis of an Authentication Scheme for Multi-Gateway Wireless Sensor Networks
    Song, Taeui
    Jung, Jaewook
    Kang, Dongwoo
    Kim, Hyoungshick
    Won, Dongho
    [J]. 2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 139 - 143
  • [7] A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    Amin, Ruhul
    Biswas, G. P.
    [J]. AD HOC NETWORKS, 2016, 36 : 58 - 80
  • [8] Multi-factor User Authentication Scheme for Multi-gateway Wireless Sensor Networks
    Wang C.-Y.
    Wang D.
    Wang F.-F.
    Xu G.-A.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (04): : 683 - 700
  • [9] A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks
    Kumar, Ravi
    Singh, Samayveer
    Singh, Deepti
    Kumar, Mohit
    Gill, Sukhpal Singh
    [J]. SECURITY AND PRIVACY, 2024, 7 (01)
  • [10] A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks
    Guo, Hua
    Gao, Ya
    Xu, Tongge
    Zhang, Xiyong
    Ye, Jianfeng
    [J]. AD HOC NETWORKS, 2019, 95