ECC-based three-factor authentication and key agreement scheme for wireless sensor networks

被引:0
|
作者
Wenfeng Huang
机构
[1] Xiamen Ocean Vocational College,School of Information Engineering
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilities and are susceptible to security attacks (e.g., masquerading user, password guessing, internal privilege, and MITT attacks), so they cannot meet the anonymity requirements or achieve forward security. To effectively improve the security performance of WSNs, an elliptic curve cryptography (ECC)-based three-factor authentication and key agreement scheme for WSNs is proposed. The scheme is based on the ECC protocol and combines biometrics, smart card and password authentication technology; uses a challenge/response mechanism to complete the authentication between users, gateways, and sensors; and negotiates a secure session key. The Burrows, Abadi and Needham logic for formal security analysis proves the correctness and security of the scheme, and the informal analysis of multiple known attacks proves that the scheme can resist various attacks and has high security characteristics. The feasibility of the scheme has been analysed and verified with the ProVerif tool. The efficiency analysis results show that the scheme is suitable for resource-constrained WSNs.
引用
收藏
相关论文
共 50 条
  • [1] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Huang, Wenfeng
    [J]. SCIENTIFIC REPORTS, 2024, 14 (01)
  • [2] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [3] Improved ECC-Based Three-Factor Multiserver Authentication Scheme
    Wu, Tsu-Yang
    Yang, Lei
    Lee, Zhiyuan
    Chen, Chien-Ming
    Pan, Jeng-Shyang
    Islam, S. K. Hafizul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] A secure three-factor authentication scheme for wireless sensor networks using ECC
    Kumar, Devender
    Singh, Harsh Kumar
    Ahlawat, Chhahat
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (04): : 879 - 900
  • [5] An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Yerong
    Zeng, Zhuang
    [J]. IEEE ACCESS, 2019, 7 : 85440 - 85451
  • [6] A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
    Shin, Sooyeon
    Kwon, Taekyoung
    [J]. SENSORS, 2019, 19 (09)
  • [7] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    [J]. FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [8] An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sutrala, Anil Kumar
    Kumari, Saru
    Odelu, Vanga
    Wazid, Mohammad
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2070 - 2092
  • [9] A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Lee, Youngsook
    Won, Dongho
    [J]. SENSORS, 2014, 14 (11): : 21023 - 21044
  • [10] RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications
    Safkhani, Masoumeh
    Bagheri, Nasour
    Kumari, Saru
    Tavakoli, Hamidreza
    Kumar, Sachin
    Chen, Jiahui
    [J]. IEEE ACCESS, 2020, 8 : 200851 - 200862