Post-quantum secure authenticated key agreement protocol for wireless sensor networks

被引:3
|
作者
Singh, Mrityunjay [1 ]
Mishra, Dheerendra [2 ]
机构
[1] SRM Univ AP, Dept Comp Sci, Amaravati 522502, Andhra Pradesh, India
[2] Maulana Azad Nait Inst Technol, Dept Math, Bhopal 465441, Madhya Pradesh, India
关键词
Wireless sensor network; Authentication; Secure communication; Post-quantum security; USER AUTHENTICATION; MUTUAL AUTHENTICATION; SCHEME; EFFICIENT; INTERNET; LIGHTWEIGHT;
D O I
10.1007/s11235-023-01043-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In today's digital world, our communication medium has become wireless. The addition of many sensor devices in wireless connection forms a wireless sensor network (WSN). To achieve data security in WSN, an efficient, secure, and authorized communication mechanism is required among remote entities. Many computationally efficient authenticated key agreement (AKA) schemes have been proposed to ensure secure and authorized communication in the pre-quantum era for WSNs. The security of most of these schemes relies on the hardness of either factoring or discrete log problem. Due to Shor's algorithm, these problems can be solved in polynomial time on any high-scale quantum computer. Hence, the AKA schemes proposed using classical cryptographic schemes will become insecure once the high-scale quantum computer becomes a reality. So, there is a requirement for the construction of new AKA designs which can resist quantum attacks. This article presents a lattice-based AKA for WSN to achieve the goal of post-quantum security and efficiency. The proposed solution is achieved using the computational problem of ring learning with errors (RLWE), where the user establishes authorized and secure communication with sensors. We have demonstrated a formal security analysis of our proposed scheme. The analysis of performance along with a comparative study are also included regarding performance comparison with existing schemes.
引用
收藏
页码:101 / 113
页数:13
相关论文
共 50 条
  • [21] An improved certificateless two-party authenticated key agreement protocol for wireless sensor networks
    Deng, Lunzhi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 208 - 215
  • [22] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [23] Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
    Wang, Hao
    Li, Yu
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [24] Provably secure post-quantum authenticated key exchange from supersingular isogenies
    Mingping Qi
    Jianhua Chen
    The Journal of Supercomputing, 2022, 78 : 12815 - 12833
  • [25] Provably secure post-quantum authenticated key exchange from supersingular isogenies
    Qi, Mingping
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (10): : 12815 - 12833
  • [26] A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
    Zhang, Ke
    Xu, Kai
    Wei, Fushan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [27] A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication
    Kumar, Uddeshaya
    Garg, Manish
    Kumari, Saru
    Dharminder, Dharminder
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (01)
  • [28] Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems
    Mishra, Dheerendra
    Pursharthi, Komal
    Singh, Mrityunjay
    Mishra, Ankita
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [29] A provably secure authenticated key agreement protocol for industrial sensor network system
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [30] Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks
    Lu, Chung-Fu
    Wu, Tzong-Chen
    Shih, Tzay-Farn
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 827 - 832