Abstract

Recently, wireless sensor networks (WSNs) have been widely used in a variety of fields, and make people’s lives more convenient and efficient. However, WSNs are usually deployed in a harsh and insecure environment. Furthermore, sensors with limited hardware resources have a low capacity for data processing and communication. For these reasons, research on efficient and secure real-time authentication and key agreement protocols based on the characteristics of WSNs has gradually attracted the attention of academics. Although many schemes have been proposed, most of them cannot achieve all known security features with satisfactory performance, among which anonymity, N-Factor security, and forward secrecy are the most vulnerable. In order to solve these shortcomings, we propose a new lightweight and anonymous three-factor authentication scheme based on symmetric cryptographic primitives for WSNs. By using the automated security verification tool ProVerif, BAN-logic verification, and an informal security analysis, we prove that our proposed scheme is secure and realizes all known security features in WSNs. Moreover, we show that our proposed scheme is practical and efficient through the comparison of security features and performance.

Highlights

  • A wireless sensor network (WSN) is a distributed and self-organizing sensor network, which is composed of a large number of sensor nodes that can perceive and understand the external world

  • By using the automated security verification tool ProVerif and BAN-logic, we prove that our proposed scheme is secure and realizes the mutual authentication of communication participants in WSNs

  • For a three-factor authentication scheme, when two of the authentication factors are captured by an adversary, it is necessary to ensure that the remaining authentication factor is still secure

Read more

Summary

Introduction

A wireless sensor network (WSN) is a distributed and self-organizing sensor network, which is composed of a large number of sensor nodes that can perceive and understand the external world. Lamport the nodes first password-based authentication and key agreement protoHowever,proposed when sensor are active in an unattended or hostile wireless network col in 1980 [6],attackers and, since research on authentication protocols has beenmessages a hot topic. Tocol based on scheme complexcould asymmetric cryptographic primitives is difficult to apply to wirefound that the not resist smart card stolen attacks and known session-specific less sensor information networks. Many schemes haveperformance been proposed, most of significant for the design of identity authentication protocols in the wireless sensor them cannot achieve all known security features with satisfactory performance. In 2019, Shin et al proposed a lightweight three-factor authentication and key agreefunctions with satisfactory performance, including anonymity, perfect forward secrecy, ment protocol for WSNs [26] and claimed that the protocol can achieve all known security n-factor andperformance.

Fuzzy Extractor
Adversary Model
Notations
User Registration Phase
Authentication Phase
1: Ui inserts
2: The receives
De-Synchronization Attack o
Forward Secrecy
Three-Factor Security
The Proposed Scheme
Sensor Registration Phase
Authentication
Security Verification Using ProVerif
BAN-Logic
Possible
3: IfXan adversary blocks
Performance Analysis
Comparison of Communication Costs
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.