An Authentication Protocol for Future Sensor Networks

被引:38
|
作者
Bilal, Muhammad [1 ]
Kang, Shin-Gak [1 ]
机构
[1] Univ Sci & Technol, Elect & Telecommun Res Inst, 218 Gajeong Ro, Daejeon 34129, South Korea
来源
SENSORS | 2017年 / 17卷 / 05期
关键词
authentication; sensor networks; network security; key distribution; privacy; BAN logic; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WORMHOLE ATTACKS; INTERNET; THINGS;
D O I
10.3390/s17050979
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
引用
收藏
页数:29
相关论文
共 50 条
  • [31] User Authentication Protocol Based On Chebyshev Polynomial For Wireless Sensor Networks
    Guo, Xuerang
    Guo, Qingrui
    Li, Yaping
    Zhang, Zhijun
    Xie, Peng
    Liu, Shali
    Sailike, Yeersen
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 1588 - 1592
  • [32] Dynamic and Resilient Protocol for Mutual Authentication of Nodes in Wireless Sensor Networks
    Vardhan, Aishwarya
    Hussain, Muzzammil
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2010 - 2015
  • [33] A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks
    Bruce, Ndibanje
    Lee, Hoon Jae
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 52 - 59
  • [35] AKB-OTS based broadcast authentication protocol for sensor networks
    Du, Zhi-Qiang
    Shen, Yu-Long
    Ma, Jian-Feng
    Zhou, Li-Hua
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2009, 31 (08): : 2008 - 2012
  • [36] Sensor Authentication in Collaborating Sensor Networks
    Bielefeldt, Jake
    Chellappan, Sriram
    2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET), 2014,
  • [37] An efficient anonymous user authentication and key agreement protocol for wireless sensor networks
    Kumar, Devender
    Grover, Harmanpreet Singh
    Kaur, Damandeep
    Verma, Adarsh
    Saini, Khushil Kumar
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (05)
  • [38] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [39] A novel secure and energy-efficient protocol for authentication in wireless sensor networks
    Nejati, Farzad
    Khoshbin, Hossein
    INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES, 2010, 5 (10): : 1558 - 1566
  • [40] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635