Abstract

Smart city can improve the efficiency of managing assets and resources, optimize urban services and improve the quality of citizens’ life. Wireless sensor networks (WSNs) can solve many problems in smart city, such as smart transportation, smart healthcare and smart energy. However, security and privacy are the biggest challenges for WSN. Recently, Banerjee et al. proposed a security-enhanced authentication and key agreement scheme for WSN, but their scheme cannot resist offline password guessing attack, impersonation attack, and does not achieve session key secrecy, identity unlinkability, and perfect forward secrecy. In order to fix these flaws, a secure and privacy-preserving authentication protocol for WSN in smart city is proposed. We prove the security of the proposed protocol by using applied pi calculus-based formal verification tool ProVerif and show that it has high computational efficiency by comparison with some related schemes.

Highlights

  • Smart city means to make use of information and communication technology, such as artificial intelligence, Internet of Things and cloud computing, to sense, analyze and integrate the key information of urban operation core system, so as to make intelligent response to various needs including people’s livelihood, environmental protection, public safety, urban services, industrial and commercial activities, to create a better city life for mankind and build sustainable communities

  • Authentication is the first step to ensure the correct transmission of information and the security of Wireless sensor networks (WSNs)

  • 2 Methods The authentication model for WSN consists of users, sensor nodes and gateway nodes

Read more

Summary

Introduction

Smart city means to make use of information and communication technology, such as artificial intelligence, Internet of Things and cloud computing, to sense, analyze and integrate the key information of urban operation core system, so as to make intelligent response to various needs including people’s livelihood, environmental protection, public safety, urban services, industrial and commercial activities, to create a better city life for mankind and build sustainable communities. Through Internet of Things devices, users can access any sensor node in WSN. Security and privacy are the biggest challenges for WSN, and many protocols are proposed in the last ten years [5,6,7,8,9,10,11,12,13,14,15,16]. These protocols have one or more weaknesses

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.