Cargando…
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to ge...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934263/ https://www.ncbi.nlm.nih.gov/pubmed/27338382 http://dx.doi.org/10.3390/s16060837 |
_version_ | 1782441307758657536 |
---|---|
author | Lu, Yanrong Li, Lixiang Peng, Haipeng Yang, Yixian |
author_facet | Lu, Yanrong Li, Lixiang Peng, Haipeng Yang, Yixian |
author_sort | Lu, Yanrong |
collection | PubMed |
description | WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. |
format | Online Article Text |
id | pubmed-4934263 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-49342632016-07-06 An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks Lu, Yanrong Li, Lixiang Peng, Haipeng Yang, Yixian Sensors (Basel) Article WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. MDPI 2016-06-08 /pmc/articles/PMC4934263/ /pubmed/27338382 http://dx.doi.org/10.3390/s16060837 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lu, Yanrong Li, Lixiang Peng, Haipeng Yang, Yixian An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks |
title | An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks |
title_full | An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks |
title_fullStr | An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks |
title_full_unstemmed | An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks |
title_short | An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks |
title_sort | energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934263/ https://www.ncbi.nlm.nih.gov/pubmed/27338382 http://dx.doi.org/10.3390/s16060837 |
work_keys_str_mv | AT luyanrong anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks AT lilixiang anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks AT penghaipeng anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks AT yangyixian anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks AT luyanrong energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks AT lilixiang energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks AT penghaipeng energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks AT yangyixian energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks |