| Literature DB >> 26121612 |
Abstract
A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.Entities:
Keywords: authentication; chaotic maps; key agreement; privacy protection; temporal credential; wireless sensor networks
Mesh:
Year: 2015 PMID: 26121612 PMCID: PMC4541817 DOI: 10.3390/s150714960
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Notation.
| Identity and password pair of user | |
| Pre-configured identity of the sensor node | |
| The long-term secret keys only known to | |
| A large prime number | |
| A temporal credential issued by | |
| The expiration time of | |
| The timestamp values. | |
| Δ | The expected time interval for the transmission delay. |
| A collision free one-way hash function [ | |
| A sends message | |
| ⊕ | The exclusive-or (XOR) operation |
| Message |
Figure 1The login and authentication phase of the proposed scheme for WSNs.
The performance comparisons of the related schemes and the proposed scheme.
| Yeh | Xue | Li | Kim | Our Scheme | ||
|---|---|---|---|---|---|---|
| 2
| 7
| 9
| 8
| 3
| ||
| Computations | 2 | 5 | 6 | 2 | 2 | |
|
| 4 | 10 | 11 | 8 | 1 | |
| Total | 8 | 22 | 26 | 18 | 6 | |
The functionality comparisons of the related schemes and the proposed scheme.
| Yeh | Xue | Li | Kim | Our Scheme | |
|---|---|---|---|---|---|
| Providing mutual authentication | Yes | Yes | Yes | Yes | Yes |
| Providing session key security | Yes | Yes | Yes | Yes | Yes |
| Providing privacy protection | No | No | No | No | Yes |
| Resisting privileged insider attacks | Yes | No | Yes | Yes | Yes |
| Resisting to impersonation attacks | Yes | Yes | No | Yes | Yes |
| Resisting password guessing attacks | No | No | Yes | Yes | Yes |
| Resisting stolen verifier attacks | Yes | No | No | Yes | Yes |
| Resisting lost smartcard attacks | No | No | Yes | Yes | Yes |
| Resisting many logged-in users attacks | No | No | Yes | Yes | Yes |