| Literature DB >> 27338382 |
Yanrong Lu1,2, Lixiang Li3,4, Haipeng Peng5,6, Yixian Yang7,8.
Abstract
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.Entities:
Keywords: anonymity; mutual authentication; smart card; wireless sensor networks
Year: 2016 PMID: 27338382 PMCID: PMC4934263 DOI: 10.3390/s16060837
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Mutual authentication and key agreement of Amin-Biswas’s scheme.
Notations.
| Symbol | Description |
|---|---|
| User | |
| Gateway node | |
| Sensor node | |
| Home gateway node | |
| Identity/Password of | |
| Random identity of | |
| Identity of | |
| Secret key of | |
| Constant transmission time | |
| Timestamp | |
| Random numbers of | |
| One-way hash function | |
| ⊕ | Xor operation |
Figure 2Known session-specific temporary information attack on Amin-Biswas’s schem.
Figure 3Mutual authentication and key agreement of our scheme.
Figure A1Role specification for the user .
Figure A2Role specification for the sensor node .
Figure A3Role specification for the gateway node .
Figure A4Role specification for the session.
Figure A5Role specification for the environment.
Figure 4Simulation result for the OFMC.
Figure 5Simulation result for the CL-AtSe.
Performance analysis.
| Ours | Aim-Biswas [ | Farash | Turkanović | Xue | |
|---|---|---|---|---|---|
| Communication cost (bits) | 3680 | 3808 | 3808 | 2816 | 3212 |
| Computation cost (user) | |||||
| Computation cost (sensor) | |||||
| Computation cost (GWN) | |||||
| Total (ms) | |||||
| Yes | Yes | Yes | Yes | ||
| Yes | Yes | Yes | Yes | Yes | |
| Yes | Yes | Yes | Yes | ||
| Yes | Yes | Yes | Yes | Yes | |
| Yes | Yes | Yes | Yes | ||
| Yes | Yes | Yes |
: Resiliency of known session-specific temporary information attack; : Resiliency of denial-of-service attack; : Resiliency of insider attack; : Resiliency of sensor node impersonation attack; : User identity protection; : Resiliency of stolen smart card attack; : Sensor node anonymity.