Post-quantum secure authenticated key agreement protocol for wireless sensor networks

被引:3
|
作者
Singh, Mrityunjay [1 ]
Mishra, Dheerendra [2 ]
机构
[1] SRM Univ AP, Dept Comp Sci, Amaravati 522502, Andhra Pradesh, India
[2] Maulana Azad Nait Inst Technol, Dept Math, Bhopal 465441, Madhya Pradesh, India
关键词
Wireless sensor network; Authentication; Secure communication; Post-quantum security; USER AUTHENTICATION; MUTUAL AUTHENTICATION; SCHEME; EFFICIENT; INTERNET; LIGHTWEIGHT;
D O I
10.1007/s11235-023-01043-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In today's digital world, our communication medium has become wireless. The addition of many sensor devices in wireless connection forms a wireless sensor network (WSN). To achieve data security in WSN, an efficient, secure, and authorized communication mechanism is required among remote entities. Many computationally efficient authenticated key agreement (AKA) schemes have been proposed to ensure secure and authorized communication in the pre-quantum era for WSNs. The security of most of these schemes relies on the hardness of either factoring or discrete log problem. Due to Shor's algorithm, these problems can be solved in polynomial time on any high-scale quantum computer. Hence, the AKA schemes proposed using classical cryptographic schemes will become insecure once the high-scale quantum computer becomes a reality. So, there is a requirement for the construction of new AKA designs which can resist quantum attacks. This article presents a lattice-based AKA for WSN to achieve the goal of post-quantum security and efficiency. The proposed solution is achieved using the computational problem of ring learning with errors (RLWE), where the user establishes authorized and secure communication with sensors. We have demonstrated a formal security analysis of our proposed scheme. The analysis of performance along with a comparative study are also included regarding performance comparison with existing schemes.
引用
收藏
页码:101 / 113
页数:13
相关论文
共 50 条
  • [1] Post-quantum secure authenticated key agreement protocol for wireless sensor networks
    Mrityunjay Singh
    Dheerendra Mishra
    Telecommunication Systems, 2023, 84 : 101 - 113
  • [2] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [3] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang
    Bin, Xie
    Qiang, He Z.
    Quan, Jin Y.
    Open Cybernetics and Systemics Journal, 2014, 8 (01): : 98 - 103
  • [4] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, S. K. Hafizul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [5] Provably secure two-party authenticated key agreement protocol for post-quantum environments
    Islam, SK Hafizul
    Journal of Information Security and Applications, 2020, 52
  • [6] Post-quantum identity-based authenticated multiple key agreement protocol
    Yang, Yang
    Yuan, Hongji
    Yan, Linbo
    Ruan, Yinglan
    ETRI JOURNAL, 2023, 45 (06) : 1090 - 1102
  • [7] A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks
    Li, Yue
    Chen, Dehua
    Li, Wei
    Wang, Gaoli
    Smith, Paul
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [8] A Novel Secure Authenticated Key Exchange Protocol for Wireless Sensor Networks
    Barakat, Tamer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 136 - 140
  • [9] Post-Quantum Attribute-Based Authenticated Key Agreement Protocol for Smart Healthcare
    Ni, Liang
    Gu, Bingke
    Liu, Xiaoyan
    Zhou, Hengsheng
    PROCEEDINGS OF THE 2024 6TH INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, BDE 2024, 2024, : 33 - 38
  • [10] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572