An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs

被引:3
|
作者
Zhou, Boqing [1 ,2 ]
Li, Sujun [1 ]
Wang, Weiping [3 ]
Wang, Jianxin [3 ]
Cheng, Yun [4 ]
Wu, Jie [5 ]
机构
[1] Shaoguan Univ, Sch Informat Sci & Engn, Shaoguan 512005, Peoples R China
[2] Hunan Normal Univ, MOE LCSM, Sch Math & Stat, Changsha 410081, Hunan, Peoples R China
[3] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[5] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 06期
基金
中国国家自然科学基金;
关键词
3-D backward key chain based on deployment knowledge; authentication; mobile sink (MS) replication attack; unattended wireless sensor networks (UWSNs); KEY PRE-DISTRIBUTION; SENSOR; MANAGEMENT; SECURE;
D O I
10.1109/JIOT.2019.2930823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS) replication attack. In this attack, using the compromised key information, an attacker can collect data from networks by impersonating sinks. To resist such an attack, some schemes have been proposed. To improve the resilience of MS replication attack of these schemes, we can integrate them with schemes based on deployment knowledge. However, there are the following defects: 1) the probability of mutual authentication between a MS and a sensor node is less than 1 and 2) during the authentication phase, the energy consumption of sensor nodes increases significantly as the deployment area expands. In this paper, we construct 3-D backward key chains based on deployment knowledge and propose a new authentication scheme based on these. As compared with these existing related schemes, the detailed theory analysis and simulation results indicate that the scheme can ensure that a MS can be authenticated by sensor nodes, and can improve the resilience of networks' MS replication attack with low energy consumption.
引用
收藏
页码:9738 / 9747
页数:10
相关论文
共 50 条
  • [1] A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks
    Li, Sujun
    Wang, Weiping
    Zhou, Boqing
    Wang, Jianxin
    Cheng, Yun
    Wu, Jie
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 250 - 253
  • [2] Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings
    Zhang, Junsong
    Li, Xiong
    Ma, Jian
    Wang, Wendong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [3] New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [4] An Efficient ACO Scheme for Mobile-Sink Based WSN
    Vaishali, Gadekar
    Nighot, M. K.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 575 - 579
  • [5] A Spoofing Attack against a Cancelable Biometric Authentication Scheme
    Izu, Tetsuya
    Sakemi, Yumi
    Takenaka, Masahiko
    Torii, Naoya
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 234 - 239
  • [6] An efficient mobile authentication scheme for wireless networks
    Tang, Caimu
    Wu, Dapeng Oliver
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) : 1408 - 1416
  • [7] A secure and efficient authentication scheme for mobile users
    Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, 621, Taiwan
    不详
    不详
    不详
    不详
    Int. J. Mobile Commun., 2006, 5 (581-594):
  • [8] A SECURE LOCALIZATION ALGORITHM BASED ON REPUTATION AGAINST WORMHOLE ATTACK IN UWSNS
    Liu, Zhenyu
    Deng, Xiongfeng
    Li, Jiajun
    2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017), 2017, : 695 - 700
  • [9] Interactive authentication scheme against collusion attack for virtual enterprises
    Zhang, Ya-Ling
    Zhang, Jing
    Wang, Xiao-Feng
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2008, 14 (07): : 1410 - 1416
  • [10] Security and Efficient Authentication Scheme for Mobile Edge Computing
    Xue J.-B.
    Bai Z.-M.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (01): : 110 - 116