Cargando…

An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to ge...

Descripción completa

Detalles Bibliográficos
Autores principales: Lu, Yanrong, Li, Lixiang, Peng, Haipeng, Yang, Yixian
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934263/
https://www.ncbi.nlm.nih.gov/pubmed/27338382
http://dx.doi.org/10.3390/s16060837
_version_ 1782441307758657536
author Lu, Yanrong
Li, Lixiang
Peng, Haipeng
Yang, Yixian
author_facet Lu, Yanrong
Li, Lixiang
Peng, Haipeng
Yang, Yixian
author_sort Lu, Yanrong
collection PubMed
description WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
format Online
Article
Text
id pubmed-4934263
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-49342632016-07-06 An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks Lu, Yanrong Li, Lixiang Peng, Haipeng Yang, Yixian Sensors (Basel) Article WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. MDPI 2016-06-08 /pmc/articles/PMC4934263/ /pubmed/27338382 http://dx.doi.org/10.3390/s16060837 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Lu, Yanrong
Li, Lixiang
Peng, Haipeng
Yang, Yixian
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
title An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
title_full An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
title_fullStr An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
title_full_unstemmed An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
title_short An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks
title_sort energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934263/
https://www.ncbi.nlm.nih.gov/pubmed/27338382
http://dx.doi.org/10.3390/s16060837
work_keys_str_mv AT luyanrong anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks
AT lilixiang anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks
AT penghaipeng anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks
AT yangyixian anenergyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks
AT luyanrong energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks
AT lilixiang energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks
AT penghaipeng energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks
AT yangyixian energyefficientmutualauthenticationandkeyagreementschemepreservinganonymityforwirelesssensornetworks