首页 | 本学科首页   官方微博 | 高级检索  
     


On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC
Authors:Anil Kumar Sutrala  Ashok Kumar Das  Neeraj Kumar  Alavalapati Goutham Reddy  Athanasios V Vasilakos  Joel J P C Rodrigues
Affiliation:1. Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500032, India;2. Department of Computer Science and Engineering, Thapar University, Patiala 147 004, India;3. Department of Computer & Information Security, Sejong University, Gwnagjin‐Gu, Seoul 05006, Republic of Korea;4. Lab of Networks and Cybersecurity, Innopolis University;5. National Institute of Telecommunications (INATEL), Santa Rita do Sapucaí‐MG, Brazil;6. Instituto de Telecomunica??es, Portugal;7. ITMO University, Saint Petersburg, Russia;8. University of Fortaleza (UNIFOR), Fortaleza‐CE, Brazil
Abstract:In wireless sensor networks (WSNs), there are many critical applications (for example, healthcare, vehicle tracking, and battlefield), where the online streaming data generated from different sensor nodes need to be analyzed with respect to quick control decisions. However, as the data generated by these sensor nodes usually flow through open channel, so there are higher chances of various types of attacks either on the nodes or on to the data captured by these nodes. In this paper, we aim to design a new elliptic curve cryptography–based user authenticated key agreement protocol in a hierarchical WSN so that a legal user can only access the streaming data from generated from different sensor nodes. The proposed scheme is based upon 3‐factor authentication, as it applies smart card, password, and personal biometrics of a user (for ticket generation). The proposed scheme maintains low computation cost for resource‐constrained sensor nodes, as it uses efficient 1‐way cryptographic hash function and bitwise exclusive‐OR operations for secure key establishment between different sensor nodes. The security analysis using the broadly accepted Burrows‐Abadi‐Needham logic, formal security verification using the popular simulation tool (automated validation of Internet security protocols and applications), and informal security show that the proposed scheme is resilient against several well‐known attacks needed for a user authentication scheme in WSNs. The comparison of security and functionality requirements, communication and computation costs of the proposed scheme, and other related existing user authentication schemes shows the superior performance of the proposed scheme.
Keywords:authentication  AVISPA  BAN logic  hierarchical wireless sensor networks  key agreement  security
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号