Skip to main content

2019 | OriginalPaper | Buchkapitel

A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks

verfasst von : Mohamed M. Mansour, Fatty M. Salem, Elsayed M. Saad

Erschienen in: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2018

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Internet of Things (IoT) is increasing pervasively, permits the unattended objects to be connected securely among themselves allowing highly classified processed data to be controlled. WSN has the most significant attention since transferring data is the most security challenge of the IoT environment. As well as, the previous messages which might be intercepted causing the established session key to be revealed. To mitigate such an attack, a lot of schemes were proposed, with an allegation of high efficient security features were achieved and powerful resilience against various attacks. After prudent studies have been made, we found that multiple proposed schemes do not support all the security requirements and are susceptible to some security attacks. In this paper, we propose a secure mutual authentication scheme with perfect forward-secrecy for WSN. Likewise, provides resilience against various types of known attacks in WSNs. Finally, the security of proposed scheme is proven.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alcaraz, C., Najera, P., Lopez, J., Roman, R.: WSNs and the internet of things do we need a complete integration? In: 1st International Workshop on the Security of the Internet of Things, SecIoT 2010. IEEE, Tokyo (2010) Alcaraz, C., Najera, P., Lopez, J., Roman, R.: WSNs and the internet of things do we need a complete integration? In: 1st International Workshop on the Security of the Internet of Things, SecIoT 2010. IEEE, Tokyo (2010)
2.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRef Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)CrossRef
3.
Zurück zum Zitat Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11, 54–61 (2004)CrossRef Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11, 54–61 (2004)CrossRef
4.
Zurück zum Zitat Akyildiz, E.A.: I.F.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRef Akyildiz, E.A.: I.F.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRef
5.
Zurück zum Zitat Stallings, W., Brown, L.: Computer Security: Principles and Practice, 2nd edn. Pearson Education, London (2011) Stallings, W., Brown, L.: Computer Security: Principles and Practice, 2nd edn. Pearson Education, London (2011)
6.
Zurück zum Zitat Pathan, A.S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. Phoenix Park, 20 February 2006, pp. 1043–1048. Institute of Electrical & Electronics Engineers (IEEE) (2006) Pathan, A.S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. Phoenix Park, 20 February 2006, pp. 1043–1048. Institute of Electrical & Electronics Engineers (IEEE) (2006)
7.
Zurück zum Zitat Xiong, L., Peng, D., Peng, T., Liang, H., Liu, Z.: A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors 17, 2681 (2017)CrossRef Xiong, L., Peng, D., Peng, T., Liang, H., Liu, Z.: A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors 17, 2681 (2017)CrossRef
8.
Zurück zum Zitat Wei, J., Liu, W., Hu, X.: Secure and efficient smart card based remote user password authentication scheme. Int. J. Netw. Secur. 18(4), 782–792 (2016) Wei, J., Liu, W., Hu, X.: Secure and efficient smart card based remote user password authentication scheme. Int. J. Netw. Secur. 18(4), 782–792 (2016)
9.
Zurück zum Zitat Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. Part I 36, 152–176 (2016)CrossRef Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. Part I 36, 152–176 (2016)CrossRef
10.
Zurück zum Zitat Yussoff, E.A.: Y.M.: A review of physical attacks and trusted platforms in wireless sensor networks. Procedia Eng. 41, 580–587 (2012)CrossRef Yussoff, E.A.: Y.M.: A review of physical attacks and trusted platforms in wireless sensor networks. Procedia Eng. 41, 580–587 (2012)CrossRef
11.
Zurück zum Zitat Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for hierarchical WSNs. J. Netw. Comput. Appl. 35, 1646–1656 (2012)CrossRef Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for hierarchical WSNs. J. Netw. Comput. Appl. 35, 1646–1656 (2012)CrossRef
12.
Zurück zum Zitat Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2012)CrossRef Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2012)CrossRef
13.
Zurück zum Zitat Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Comm. 8(3), 1086–1090 (2009)CrossRef Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Comm. 8(3), 1086–1090 (2009)CrossRef
14.
Zurück zum Zitat Wang, P.W.D.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73(14), 41–57 (2014)CrossRef Wang, P.W.D.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73(14), 41–57 (2014)CrossRef
15.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8, 1070–1081 (2014)CrossRef Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8, 1070–1081 (2014)CrossRef
16.
Zurück zum Zitat Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme. Int. J. Commun Syst 27(2), 377–389 (2014)CrossRef Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme. Int. J. Commun Syst 27(2), 377–389 (2014)CrossRef
17.
Zurück zum Zitat Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5), 321–325 (2010)CrossRef Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5), 321–325 (2010)CrossRef
18.
Zurück zum Zitat Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Xu et al.’s authentication scheme using smart cards. In: Proceedings of the Third Annual ACM Bangalore Conference, p. 15 (2010) Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Xu et al.’s authentication scheme using smart cards. In: Proceedings of the Third Annual ACM Bangalore Conference, p. 15 (2010)
19.
Zurück zum Zitat Li, X., Niu, J., Khan, M.K., Liao, J.: An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5), 1365–1371 (2013)CrossRef Li, X., Niu, J., Khan, M.K., Liao, J.: An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5), 1365–1371 (2013)CrossRef
20.
Zurück zum Zitat Kumari, S., Khan, M.K.: Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme. Int. J. Commun Syst 27(12), 3939–3955 (2014)CrossRef Kumari, S., Khan, M.K.: Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme. Int. J. Commun Syst 27(12), 3939–3955 (2014)CrossRef
21.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., Li, X.: Improvement of robust smart-card-based password authentication scheme. Int. J. Commun Syst 28(2), 383–393 (2015)CrossRef Jiang, Q., Ma, J., Li, G., Li, X.: Improvement of robust smart-card-based password authentication scheme. Int. J. Commun Syst 28(2), 383–393 (2015)CrossRef
22.
Zurück zum Zitat Turkanović, M., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–112 (2014)CrossRef Turkanović, M., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–112 (2014)CrossRef
23.
Zurück zum Zitat Lu, Y., Li, L., Peng, H., Yang, Y.: An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors 16, 837 (2016)CrossRef Lu, Y., Li, L., Peng, H., Yang, Y.: An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors 16, 837 (2016)CrossRef
24.
Zurück zum Zitat Jung, J., Kim, J., Choi, Y., Won, D.: An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors 16, 1299 (2016)CrossRef Jung, J., Kim, J., Choi, Y., Won, D.: An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors 16, 1299 (2016)CrossRef
25.
Zurück zum Zitat Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)CrossRef Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)CrossRef
Metadaten
Titel
A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks
verfasst von
Mohamed M. Mansour
Fatty M. Salem
Elsayed M. Saad
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-99010-1_41