Abstract

Underwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive and special, only authenticated users have rights to get the information. The existing secure resource-constrained authentication schemes are not inapplicable for underwater acoustic networks, so a lightweight authentication scheme is the primarily task in underwater acoustic networks. In this paper, we present a chaotic maps remote user authentication and key agreement scheme for underwater acoustic networks based on the DLP and DHP, in which only authenticated users have rights to obtain the information. The proposed scheme applies the lightweight cryptographic primitives, such as one-way hash function and chaotic maps to accomplish mutual authentication and key agreement for underwater acoustic networks. The security of the proposed scheme is certified by applying the BAN logic and Random Oracle Model. Security analysis shows that our proposed scheme is safe and can meet ten security requirements and seven security goals. Performance analysis shows that our proposed scheme is more efficient compared with other resource-constrained schemes.

Highlights

  • With the increasing frequency of human activities in the ocean, more and more information need to be transmitted from the underwater environment, and the underwater acoustic networks (UANs) communication technology has been widely applied in scientific expedition, marine engineering construction, investigation and development of submarine mineral resources, and military fields

  • The sensor nodes are often placed in a hostile and unattended underwater environment to gather information, so it is necessary to guarantee the secure communication among the sensor node, the user and the gateway node

  • The user first needs to register at the gateway node and becomes a valid user through mutual authentication and gets the information gathered by the sensor nodes

Read more

Summary

INTRODUCTION

With the increasing frequency of human activities in the ocean, more and more information need to be transmitted from the underwater environment, and the underwater acoustic networks (UANs) communication technology has been widely applied in scientific expedition, marine engineering construction, investigation and development of submarine mineral resources, and military fields. Das [6] proposed the robust password-based remote user authentication scheme using smart card for the Integrated EPR Information System, and Li et al [7] introduced secure remote user authentication and key agreement scheme for the Integrated EPR Information System at the same year They both applied the lightweight hash function to fulfill mutual authentication in their schemes. Zhu [13] pointed out that static ID is unable to protect user anonymity in client–server environment and dynamic ID in the authentication scheme based on Chebyshev chaotic maps can resist active attacks as well as has better computational efficiency. Xie et al [19] first carried out three-party password authenticated scheme without utilizing timestamp based on chaotic maps instead of modular exponentiation and scalar multiplication on an elliptic curve Their protocol is robust enough to withstand various attacks. Some notations and abbreviations used in this paper are briefly presented in table 1

CHEBYSHEV CHAOTIC MAPS Definition 1: Chebyshev polynomial is presented as
OUR PROPORSED SCHEME
INITIALIZATION SECTION Step1
SENSOR NODE REGISTRATION Step1
USER REGISTRATION Step1
LOGIN SECTION Step1
AUTHENTICATION AND KEY MANAGEMENT SECTION Step1
SENSOR NODE ADDITION SECTION
PASSWORD MODIFICATION SECTION
SECURITY ANALYSIS
SENSOR NODE ANONYMITY
MUTUAL AUTHENTICATION
DENIAL OF SERVICE ATTACK
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call