Cargando…

Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments

In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play...

Descripción completa

Detalles Bibliográficos
Autores principales: Chen, Chi-Tung, Lee, Cheng-Chi, Lin, Iuon-Chang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7192470/
https://www.ncbi.nlm.nih.gov/pubmed/32353049
http://dx.doi.org/10.1371/journal.pone.0232277
_version_ 1783528016072146944
author Chen, Chi-Tung
Lee, Cheng-Chi
Lin, Iuon-Chang
author_facet Chen, Chi-Tung
Lee, Cheng-Chi
Lin, Iuon-Chang
author_sort Chen, Chi-Tung
collection PubMed
description In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote user authentication is crucial for information transmission. Computational efficiency and energy consumption are crucial because the energy available to any WSN is limited. This paper proposes a notably efficient and secure authentication scheme based on temporal credential and dynamic ID for WSNs in IoT environments. The Burrows–Abadi–Needham (BAN) logic method was used to validate our scheme. Cryptanalysis revealed that our scheme can overcome the security weaknesses of previously published schemes. The security functionalities and performance efficiency of our scheme are compared with those of previous related schemes. The result demonstrates that our scheme’s security functionalities are quantitatively and qualitatively superior to those of comparable schemes. Our scheme can improve the effectiveness of authentication in IoT environments. Notably, our scheme has superior performance efficiency, low computational cost, frugal energy consumption, and low communication cost.
format Online
Article
Text
id pubmed-7192470
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-71924702020-05-11 Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments Chen, Chi-Tung Lee, Cheng-Chi Lin, Iuon-Chang PLoS One Research Article In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote user authentication is crucial for information transmission. Computational efficiency and energy consumption are crucial because the energy available to any WSN is limited. This paper proposes a notably efficient and secure authentication scheme based on temporal credential and dynamic ID for WSNs in IoT environments. The Burrows–Abadi–Needham (BAN) logic method was used to validate our scheme. Cryptanalysis revealed that our scheme can overcome the security weaknesses of previously published schemes. The security functionalities and performance efficiency of our scheme are compared with those of previous related schemes. The result demonstrates that our scheme’s security functionalities are quantitatively and qualitatively superior to those of comparable schemes. Our scheme can improve the effectiveness of authentication in IoT environments. Notably, our scheme has superior performance efficiency, low computational cost, frugal energy consumption, and low communication cost. Public Library of Science 2020-04-30 /pmc/articles/PMC7192470/ /pubmed/32353049 http://dx.doi.org/10.1371/journal.pone.0232277 Text en © 2020 Chen et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Chen, Chi-Tung
Lee, Cheng-Chi
Lin, Iuon-Chang
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
title Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
title_full Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
title_fullStr Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
title_full_unstemmed Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
title_short Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
title_sort efficient and secure three-party mutual authentication key agreement protocol for wsns in iot environments
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7192470/
https://www.ncbi.nlm.nih.gov/pubmed/32353049
http://dx.doi.org/10.1371/journal.pone.0232277
work_keys_str_mv AT chenchitung efficientandsecurethreepartymutualauthenticationkeyagreementprotocolforwsnsiniotenvironments
AT leechengchi efficientandsecurethreepartymutualauthenticationkeyagreementprotocolforwsnsiniotenvironments
AT liniuonchang efficientandsecurethreepartymutualauthenticationkeyagreementprotocolforwsnsiniotenvironments