| Literature DB >> 32353049 |
Chi-Tung Chen1, Cheng-Chi Lee2,3, Iuon-Chang Lin3,4.
Abstract
In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote user authentication is crucial for information transmission. Computational efficiency and energy consumption are crucial because the energy available to any WSN is limited. This paper proposes a notably efficient and secure authentication scheme based on temporal credential and dynamic ID for WSNs in IoT environments. The Burrows-Abadi-Needham (BAN) logic method was used to validate our scheme. Cryptanalysis revealed that our scheme can overcome the security weaknesses of previously published schemes. The security functionalities and performance efficiency of our scheme are compared with those of previous related schemes. The result demonstrates that our scheme's security functionalities are quantitatively and qualitatively superior to those of comparable schemes. Our scheme can improve the effectiveness of authentication in IoT environments. Notably, our scheme has superior performance efficiency, low computational cost, frugal energy consumption, and low communication cost.Entities:
Year: 2020 PMID: 32353049 PMCID: PMC7192470 DOI: 10.1371/journal.pone.0232277
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Wireless sensor networks.
Fig 5Password change phase in the proposed scheme (U can update the password without requiring the communication with the GWN and S).
Notation definitions.
| Notation | Definition |
|---|---|
| The | |
| The | |
| The gateway node | |
| The identification of | |
| The identification of the | |
| The identification of | |
| The dynamic ID of | |
| The dynamic ID of the | |
| The password of | |
| The password of | |
| Biometric key generation/extraction function | |
| Biometric of | |
| Unique smart card number | |
| Private key only known to the GWN | |
| Private key only known to the GWN | |
| Shard session key between | |
| Temporal credential issued by the GWN to | |
| Temporal credential issued by the GWN to | |
| Expiration time of a user’s temporal credential | |
| Timestamp value | |
| String concatenation manipulation | |
| → | Common channel |
| ⊕ | Exclusive-or manipulation |
| ⇒ | Secure channel |
| h(•) | One-way hash function |
a A common channel is a channel allocated in common to participants.
b A secure channel is a channel of delivering messages that can withstand tampering and overhearing.
c A hash function has a one-way property that it is computationally infeasible to find a data object to map to a hash result [43].
Fig 2Registration phase for users in the proposed scheme.
Fig 3Registration phase for sensor nodes in the proposed scheme.
Fig 4Login phase; authentication and key agreement phase.
Notations of BAN logic.
| Notation | Definition |
|---|---|
| #( | |
| 〈 | |
| ( | |
| Statement |
Functionality comparison of our scheme with other related schemes.
| Ours Ostad-Sharif Amin et al. Chang et al. Xue et al. Yeh et al. Khan et al. Chen et al. Das | |
|---|---|
| Password protection | Yes Yes Yes No No Yes Yes No No |
| Stolen smart card attack resistance | Yes Yes Yes No No No No No No |
| Masquerade attack resistance | Yes Yes Yes No Yes Yes Yes No No |
| Replay attacks resistance | Yes Yes Yes No Yes No Yes Yes Yes |
| Insider attack resistance | Yes Yes Yes Yes No Yes Yes No No |
| Password updating/changing | Yes No Yes Yes No No Yes No No |
| Time synchronization avoidance | Yes No No No No Yes No No No |
| Mutual authentication | Yes No Yes Yes Yes Yes Yes Yes No |
| Session key agreement | Yes Yes Yes Yes Yes Yes No No No |
| User anonymity | Yes Yes Yes No Yes No Yes Yes Yes |
| GWN bypassing attack resistance | Yes Yes Yes Yes Yes Yes No No No |
Performance comparison of our scheme with other related schemes.
| Ours Ostad-Sharif Amin et al. Chang et al. Xue et al. Yeh et al. Khan et al. Chen et al. Das | |
|---|---|
| 【 | |
| | |
| User | 4 |
| GWN | 8 |
| Sensor node | 3 |
| | |
| User | 3 |
| GWN | 3 |
| Sensor node | 3 |
| Total | 24 |
| 【 | |
| Transmitted message | 4 6 6 4 4 3 4 4 3 |
* Khan et al. scheme, Chen et al. scheme and Das scheme do not provide the key agreement phase for session key agreement.
Fig 6Comparison of running time.
Fig 7Comparison of energy consumption.