Cargando…
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7192470/ https://www.ncbi.nlm.nih.gov/pubmed/32353049 http://dx.doi.org/10.1371/journal.pone.0232277 |
_version_ | 1783528016072146944 |
---|---|
author | Chen, Chi-Tung Lee, Cheng-Chi Lin, Iuon-Chang |
author_facet | Chen, Chi-Tung Lee, Cheng-Chi Lin, Iuon-Chang |
author_sort | Chen, Chi-Tung |
collection | PubMed |
description | In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote user authentication is crucial for information transmission. Computational efficiency and energy consumption are crucial because the energy available to any WSN is limited. This paper proposes a notably efficient and secure authentication scheme based on temporal credential and dynamic ID for WSNs in IoT environments. The Burrows–Abadi–Needham (BAN) logic method was used to validate our scheme. Cryptanalysis revealed that our scheme can overcome the security weaknesses of previously published schemes. The security functionalities and performance efficiency of our scheme are compared with those of previous related schemes. The result demonstrates that our scheme’s security functionalities are quantitatively and qualitatively superior to those of comparable schemes. Our scheme can improve the effectiveness of authentication in IoT environments. Notably, our scheme has superior performance efficiency, low computational cost, frugal energy consumption, and low communication cost. |
format | Online Article Text |
id | pubmed-7192470 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-71924702020-05-11 Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments Chen, Chi-Tung Lee, Cheng-Chi Lin, Iuon-Chang PLoS One Research Article In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote user authentication is crucial for information transmission. Computational efficiency and energy consumption are crucial because the energy available to any WSN is limited. This paper proposes a notably efficient and secure authentication scheme based on temporal credential and dynamic ID for WSNs in IoT environments. The Burrows–Abadi–Needham (BAN) logic method was used to validate our scheme. Cryptanalysis revealed that our scheme can overcome the security weaknesses of previously published schemes. The security functionalities and performance efficiency of our scheme are compared with those of previous related schemes. The result demonstrates that our scheme’s security functionalities are quantitatively and qualitatively superior to those of comparable schemes. Our scheme can improve the effectiveness of authentication in IoT environments. Notably, our scheme has superior performance efficiency, low computational cost, frugal energy consumption, and low communication cost. Public Library of Science 2020-04-30 /pmc/articles/PMC7192470/ /pubmed/32353049 http://dx.doi.org/10.1371/journal.pone.0232277 Text en © 2020 Chen et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Chen, Chi-Tung Lee, Cheng-Chi Lin, Iuon-Chang Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments |
title | Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments |
title_full | Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments |
title_fullStr | Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments |
title_full_unstemmed | Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments |
title_short | Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments |
title_sort | efficient and secure three-party mutual authentication key agreement protocol for wsns in iot environments |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7192470/ https://www.ncbi.nlm.nih.gov/pubmed/32353049 http://dx.doi.org/10.1371/journal.pone.0232277 |
work_keys_str_mv | AT chenchitung efficientandsecurethreepartymutualauthenticationkeyagreementprotocolforwsnsiniotenvironments AT leechengchi efficientandsecurethreepartymutualauthenticationkeyagreementprotocolforwsnsiniotenvironments AT liniuonchang efficientandsecurethreepartymutualauthenticationkeyagreementprotocolforwsnsiniotenvironments |