| Literature DB >> 30845771 |
Meriske Chen1, Tian-Fu Lee2,3, Jiann-I Pan4.
Abstract
Agriculture plays an important role for many countries. It provides raw materials for foodand provides large employment opportunities for people in the country, especially for countrieswith a dense population. To enhance agriculture productivity, modern technology such as wirelesssensor networks (WSNs) can be utilized to help in monitoring important parameters in thwagricultural field such as temperature, light, soil moisture, etc. During the monitoring process, ifsecurity compromises happen, such as interception or modification of the parameters, it may leadto false decisions and bring damage to agriculture productivity. Therefore, it is very important todevelop secure authentication and key agreement for the system. Recently, Ali et al. proposed anauthentication and key agreement scheme using WSNs for agriculture monitoring. However, it failsto provide user untraceability, user anonymity, and session key security; it suffers from sensor nodeimpersonation attack and perfect forward secrecy attack; and even worse has denial of service as aservice. This study discusses these limitations and proposes a new secure and more efficientauthentication and key agreement scheme for agriculture monitoring using WSNs. The proposedscheme utilizes dynamic pseudonym identity to guarantee user privacy and eliminates redundantcomputations to enhance efficiency.Entities:
Keywords: agriculture WSN; agriculture decision support system; agriculture monitoring; dynamic identity; key agreement; lightweight authentication
Mesh:
Year: 2019 PMID: 30845771 PMCID: PMC6427367 DOI: 10.3390/s19051146
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Agriculture monitoring system model of the proposed scheme.
Notations of the proposed scheme.
| Symbol | Description |
|---|---|
|
| User/agriculture professional |
|
| Base station |
|
| Gateway node |
|
| Sensor node |
| Identity of | |
|
| Password of |
|
| Biometric of |
|
| Shared key between |
|
| Secret key of |
|
| Secret key shared between |
|
| Secret key shared between |
| Random nonce of | |
|
| Session key |
|
| Timestamp of |
|
| Time differences between |
| Encryption, Decryption using shared | |
|
| Generate function of fuzzy extractor |
|
| Reproduce function of fuzzy extractor |
|
| Hash function |
| ⊕ | Exclusive OR operation |
| || | Concatenation operation |
Figure 2Registration phase of Ali et al.’s scheme.
Figure 3Login, authentication and key agreement phase of Ali et al.’s scheme.
Figure 4Password update phase of Ali et al.’s scheme.
Figure 5User registration phase of the proposed scheme.
Figure 6Login phase of the proposed scheme.
Figure 7Authentication and key agreement phase of the proposed scheme.
Figure 8Password update phase of the proposed scheme.
BAN (Burrows-Abadi-Needham) logic notations and respective abbreviations.
| Notation | Abbreviation |
|---|---|
| The entity | |
|
| |
|
| |
|
| Formula |
|
| |
|
| |
|
| The message |
Functionality comparisons.
| Attributes | Ali et al. Scheme | Proposed Scheme |
|---|---|---|
| User anonymity | N | Y |
| User traceability | N | Y |
| Three-factor security | Y | Y |
| Session key security | N | Y |
| Perfect forward secrecy attack | N | Y |
| Sensor node impersonation attack | N | Y |
| Gateway node impersonation attack | Y | Y |
| User/agriculture impersonation attack | Y | Y |
| Offline password guessing attack | Y | Y |
| Replay attack | Y | Y |
| Insider attack | N | Y |
| Denial of Service as a Service | N | Y |
Performance comparisons.
|
|
|
|
| Total | |
|---|---|---|---|---|---|
| Ali et al.’s scheme |
|
|
|
|
|
| Response time | 0.00836 s | 0.00832 s | 0.01044 s | 0.00514 s | 0.03512 s |
| Proposed scheme |
|
|
|
|
|
| Response time | 000280 s | 0.00176 s | 0.00126 s | 0.00144 s | 0.00740 s |
Simulation environment.
| Hardware/Software Specification | ||
|---|---|---|
|
| Mainboard | ASUSTeK Computer INC. CM5571 |
| CPU | Intel Core 2 Quad Q8300 @ 2.50 GHz 2.50 GHz | |
| Memory | 4.00 GB Dual-Channel DDR3 @ 533 MHz | |
| OS | Windows 7 64-bit SP1 | |
|
| Mainboard | ASUSTeK Computer INC. CM5571 |
| CPU | Intel Core 2 Quad Q8300 @ 2.50 GHz 2.50 GHz | |
| Memory | 4.00 GB Dual-Channel DDR3 @ 533 MHz | |
| OS | Windows 7 64-bit SP1 | |
|
| Mainboard | IBM 46W9191 |
| CPU | Intel Xeon E3 1231 v3 @ 3.40 GHz 3.40 GHz | |
| Memory | 8.00 GB Dual-Channel DDR3 @ 800 MHz | |
| OS | Windows Server 2008 R2 Standard 64-bit SP1 | |
|
| Mainboard | ASUSTeK Computer INC. UX303LN |
| CPU | Intel Core i3/i5/i7 4xxx @ 1.70 GHz | |
| Memory | 4.00 GB Single-Channel DDR3 @ 798 MHz | |
| OS | Windows 8.1 64-bit | |
| Used Programming Language and Algorithms C/C++ Hash function: SHA-1 | ||