Post-quantum secure authenticated key agreement protocol for wireless sensor networks

被引:3
|
作者
Singh, Mrityunjay [1 ]
Mishra, Dheerendra [2 ]
机构
[1] SRM Univ AP, Dept Comp Sci, Amaravati 522502, Andhra Pradesh, India
[2] Maulana Azad Nait Inst Technol, Dept Math, Bhopal 465441, Madhya Pradesh, India
关键词
Wireless sensor network; Authentication; Secure communication; Post-quantum security; USER AUTHENTICATION; MUTUAL AUTHENTICATION; SCHEME; EFFICIENT; INTERNET; LIGHTWEIGHT;
D O I
10.1007/s11235-023-01043-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In today's digital world, our communication medium has become wireless. The addition of many sensor devices in wireless connection forms a wireless sensor network (WSN). To achieve data security in WSN, an efficient, secure, and authorized communication mechanism is required among remote entities. Many computationally efficient authenticated key agreement (AKA) schemes have been proposed to ensure secure and authorized communication in the pre-quantum era for WSNs. The security of most of these schemes relies on the hardness of either factoring or discrete log problem. Due to Shor's algorithm, these problems can be solved in polynomial time on any high-scale quantum computer. Hence, the AKA schemes proposed using classical cryptographic schemes will become insecure once the high-scale quantum computer becomes a reality. So, there is a requirement for the construction of new AKA designs which can resist quantum attacks. This article presents a lattice-based AKA for WSN to achieve the goal of post-quantum security and efficiency. The proposed solution is achieved using the computational problem of ring learning with errors (RLWE), where the user establishes authorized and secure communication with sensors. We have demonstrated a formal security analysis of our proposed scheme. The analysis of performance along with a comparative study are also included regarding performance comparison with existing schemes.
引用
收藏
页码:101 / 113
页数:13
相关论文
共 50 条
  • [31] Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systemsConstruction of post quantum secure authenticated key agreement protocol for dew-assisted IoT...D. Mishra et al.
    Dheerendra Mishra
    Komal Pursharthi
    Mrityunjay Singh
    Ankita Mishra
    International Journal of Information Security, 2025, 24 (1)
  • [32] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [33] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Jangirala Srinivas
    Dheerendra Mishra
    Sourav Mukhopadhyay
    Saru Kumari
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 875 - 895
  • [34] Energy-Efficient and Secure Clustering with Post-Quantum DTLS in Wireless Sensor Networks
    Banerjee, Utsav
    2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024, 2024,
  • [35] Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging
    Bhargavan, Karthikeyan
    Jacomme, Charlie
    Kiefer, Franziskus
    Schmidt, Rolfe
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 469 - 486
  • [36] A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
    Wei, Fushan
    Zhang, Ruijie
    Shen, Jian
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 849 - 855
  • [37] A minimal protocol for authenticated key distribution in wireless sensor networks
    Singh, Kalvinder
    Muthukkumarasamy, Vallipuram
    FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSING AND INFORMATION PROCESSSING, PROCEEDINGS, 2006, : 78 - 83
  • [38] Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks
    Han, Kyusuk
    Kim, Kwangjo
    Choi, Wook
    Choi, Hyo Hyun
    Seo, Jungtaek
    Shon, Taeshik
    AD HOC & SENSOR WIRELESS NETWORKS, 2012, 14 (3-4) : 251 - 269
  • [39] A Biometric Authenticated Key Agreement Protocol for Secure Token
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (08): : 2311 - 2315
  • [40] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346