An Authentication Protocol for Future Sensor Networks

被引:38
|
作者
Bilal, Muhammad [1 ]
Kang, Shin-Gak [1 ]
机构
[1] Univ Sci & Technol, Elect & Telecommun Res Inst, 218 Gajeong Ro, Daejeon 34129, South Korea
来源
SENSORS | 2017年 / 17卷 / 05期
关键词
authentication; sensor networks; network security; key distribution; privacy; BAN logic; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WORMHOLE ATTACKS; INTERNET; THINGS;
D O I
10.3390/s17050979
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
引用
收藏
页数:29
相关论文
共 50 条
  • [21] A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3808 - 3819
  • [22] Authentication in Wireless Sensor Networks Using Zero Knowledge Protocol
    Hashim, Muneera
    Kumar, Santhosh G.
    Sreekumar, A.
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 416 - 421
  • [23] Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks
    Ying, Bidi
    Mohsen, Nada Radwan
    Nayak, Amiya
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2021, 2 : 130 - 138
  • [24] A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
    Li, Xiong
    Niu, Jianwei
    Choo, Kim-Kwang Raymond
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 30 - 44
  • [25] Message and its origin authentication protocol for data aggregation in sensor networks
    Lee, HongKi
    Nyang, DaeHun
    Song, JooSeok
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 281 - 290
  • [26] A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks
    Yu, SungJin
    YoungLee, Joon
    Kim, MyeongHyun
    Park, YoungHo
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 830 - 834
  • [27] An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 : 133 - 144
  • [28] Secure and efficient mutual user authentication protocol for wireless sensor networks
    Yang, Qinghua
    Wang, Liejun
    Liu, Qi
    Wang, Mingwei
    Journal of Software Engineering, 2014, 8 (03): : 184 - 193
  • [29] The Design of a Secure Three Factor Authentication Protocol for Wireless Sensor Networks
    Babu, Naresh M.
    Chakravarthy, A. S. N.
    Ravindranath, C.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 184 - 190
  • [30] LAP: A Lightweight Authentication Protocol for Smart Dust Wireless Sensor Networks
    Sharifi, Mohsen
    Kashi, Saeed Sedighian
    Ardakani, Saeed Pourroostaei
    PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 258 - 265