Abstract

Wireless sensor networks (WSN) are widely used to provide users with convenient services such as health-care, and smart home. To provide convenient services, sensor nodes in WSN environments collect and send the sensing data to the gateway. However, it can suffer from serious security issues because susceptible messages are exchanged through an insecure channel. Therefore, secure authentication protocols are necessary to prevent security flaws in WSN. In 2020, Moghadam et al. suggested an efficient authentication and key agreement scheme in WSN. Unfortunately, we discover that Moghadam et al.’s scheme cannot prevent insider and session-specific random number leakage attacks. We also prove that Moghadam et al.’s scheme does not ensure perfect forward secrecy. To prevent security vulnerabilities of Moghadam et al.’s scheme, we propose a secure and lightweight mutual authentication protocol for WSNs (WSN-SLAP). WSN-SLAP has the resistance from various security drawbacks, and provides perfect forward secrecy and mutual authentication. We prove the security of WSN-SLAP by using Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Verification of Internet Security Protocols and Applications (AVISPA) simulation. In addition, we evaluate the performance of WSN-SLAP compared with existing related protocols. We demonstrate that WSN-SLAP is more secure and suitable than previous protocols for WSN environments.

Highlights

  • As a rapid development of wireless communication technology, wireless sensor networks (WSN) can be applied to various environments such as smart grids, smart homes, agriculture, industrial internet of things (IoT), and health-care [1,2,3,4,5]

  • We demonstrate the mutual authentication of WSN-SLAP using Burrows–Abadi– Needham (BAN) logic [8]

  • We discovered that Moghadam et al.’s scheme has vulnerabilities against insider, and session-specific random number leakage attacks

Read more

Summary

Introduction

As a rapid development of wireless communication technology, wireless sensor networks (WSN) can be applied to various environments such as smart grids, smart homes, agriculture, industrial internet of things (IoT), and health-care [1,2,3,4,5]. The gateway manages the private information of sensor nodes and users to provide secure services. These sensors send the collected data to the physician These services can be exposed to various security attacks because each entity exchanges information through a public channel. In 2020, Moghadam et al [6] suggested an authentication and key agreement scheme for WSN environments utilizing Elliptic-Curve Diffie-Hellman (ECDH) [7]. They demonstrated that their scheme is efficient and secure against various security attacks such as replay, password guessing, stolen verifier, and man-in-the-middle (MITM) attacks. To improve security vulnerabilities and reduce the computational cost of Moghadam et al.’s scheme, we propose a secure and lightweight mutual authentication protocol (WSN-SLAP) considering security and efficiency features using hash functions and XOR operations

Contributions
Adversary Model
Organization
Related Works
Sensor Node Registration Phase
User Registration Phase
Login and Authentication Phase
Insider Attack
Perfect Forward Secrecy
Session-Specific Random Number Leakage Attack
Proposed Scheme
Stolen Smart Card Attack
Replay Attack
Sensor Node Capture Attack
Off-Line Password Guessing Attack
Privileged Insider Attack
Stolen Verifier Attack
MITM Attack
6.1.10. Perfect Forward Secrecy
6.1.11. Mutual Authentication
BAN Logic
BAN Logic Proof We conduct the BAN logic analysis of WSN-SLAP as follows
AVISPA Simulation
HLPSL Specifications
Performance Analysis
Computational Costs
Communication Costs
Security Properties
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call