SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network

被引:0
|
作者
Deepti Singh
Bijendra Kumar
Samayveer Singh
Satish Chand
机构
[1] Netaji Subhas Institute of Technology,Division of Computer Engineering
[2] National Institute of Technology Jalandhar,Department of Computer Science and Engineering
[3] Jawaharlal Nehru University,School of Computer and Systems Sciences
来源
关键词
User authentication; MAC function; Session key; Security and privacy;
D O I
暂无
中图分类号
学科分类号
摘要
User authentication is an elementary security prerequisite in resource-constrained wireless sensor networks (WSNs). Recently, Amin et al. presented an anonymity preserving authentication scheme for WSN which is secure against both active and passive attacks. In this paper, we first cryptanalyzed Amin et al. scheme and find that it suffers from the password guessing, impersonation, session key leakage attacks. To address these deficiencies, we propose a secure authentication scheme for wireless sensor network (SMAC-AS) by using MAC function. It additionally uses symmetric encryption and decryption operations for authentication to prevent forgery. We use OTCODE as one time activation code that is more secure than password. The SMAC-AS is a low cost and much faster in practice because it uses light weight MAC function and symmetric operations. Decryption of MAC is not easy. Moreover, SMAC-AS also helps in faster and efficient transmission of the message because of the lightweight function and operations which leads to saving the battery of the sensor nodes. We use BAN logic for authentication proof. The formal security analysis using random oracle model is done to show its efficacy.
引用
收藏
页码:1289 / 1308
页数:19
相关论文
共 50 条
  • [31] Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    Lee, Chin -Wen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 249 - 257
  • [32] A Secure and Efficient Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks
    Vorugunti, Chandra Sekhar
    Sarvabhatla, Mrudula
    PROCEEDINGS OF NINTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2013), 2014, 299 : 245 - 259
  • [33] Agent Based Secure Multicast Authentication on Wireless Network
    Hameedi, M. S. S.
    Kannan, N.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2015, 74 (05): : 271 - 276
  • [34] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [35] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [36] A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks
    Ayday, E.
    Fekri, F.
    AD HOC NETWORKS, 2012, 10 (07) : 1278 - 1290
  • [37] An Efficient and Secure Authentication Scheme using Markov Chain for Wireless Sensor Networks
    Singh, Deepti
    Kumar, Bijendra
    Singh, Samayveer
    Chand, Satish
    PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 33 - 38
  • [38] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [39] A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
    Li, Chun-Ta
    Weng, Chi-Yao
    Chen, Chin-Ling
    Lee, Cheng-Chi
    INTERNET OF VEHICLES: TECHNOLOGIES AND SERVICES TOWARDS SMART CITY (IOV 2018), 2018, 11253 : 278 - 288
  • [40] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985