An Efficient and Secure Authentication Scheme using Markov Chain for Wireless Sensor Networks

被引:0
|
作者
Singh, Deepti [1 ]
Kumar, Bijendra [1 ]
Singh, Samayveer [2 ]
Chand, Satish [3 ]
机构
[1] Netaji Subhas Inst Technol, Dept Comp Engn, New Delhi, India
[2] Bennett Univ, Dept Comp Sci Engn, Greater Noida, India
[3] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
关键词
Wireless sensor network; authentication; smart card; session key; KEY AGREEMENT SCHEME; USER AUTHENTICATION; PROTOCOL; INTERNET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to varied applications of wireless sensor networks (WSNs), data is required by any user when and wherever they require. Usually, base station gathers all information from the sensor and sends it periodically to the user. But for real-time application, mutual authentication among the communicating nodes is required. During user authentication base station checks that the user is authorized to gather the collected information from the sensor node through an insecure channel. In this paper, we propose an efficient authentication scheme which provides anonymity of user in WSNs that uses Markov chain. The Markov chain is a stochastic process that can be used for a system in which it follows a chain of linked events but next event depends only on the current state of the system. Stationary limit distribution of matrix is created by the base station to help the user to keep their password and identity safe. The security analysis verifies that the proposed scheme is safe against various attacks like forgery, parallel session attacks, user impersonation, etc.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 50 条
  • [21] A new and secure authentication scheme for wireless sensor networks with formal proof
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 16 - 30
  • [22] An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks
    Zhou, Xiancun
    Xiong, Yan
    [J]. INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 266 - 273
  • [23] Scatter - secure code authentication for efficient reprogramming in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2011, 10 (1-2) : 14 - 24
  • [24] Efficient User Authentication and Secure Data Transmission in Wireless Sensor Networks
    Das, Manik Lal
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 240 - 245
  • [25] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [26] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52
  • [27] An Energy-Efficient Secure Scheme in Wireless Sensor Networks
    Bok, Kyoungsoo
    Lee, Yunjeong
    Park, Junho
    Yoo, Jaesoo
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [28] A secure and efficient key management scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 162 - 167
  • [29] Secure Authentication in Wireless Sensor Networks using RF Fingerprints
    Knox, D. A.
    Kunz, T.
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE, 2008, : 230 - 237
  • [30] A Secure Authentication and Data Sharing Scheme for Wireless Sensor Networks based on Blockchain
    Khan, Asad Ullah
    Javaid, Nadeem
    Ben Othman, Jalel
    [J]. 26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,