Journal
WIRELESS PERSONAL COMMUNICATIONS
Volume 117, Issue 2, Pages 1361-1385Publisher
SPRINGER
DOI: 10.1007/s11277-020-07926-7
Keywords
Authentication; IoT; Smart card; Security; Wireless sensor networks
Categories
Ask authors/readers for more resources
This paper focuses on the importance and challenges of securely accessing information from sensor nodes in wireless sensor networks and IoT environments. By refining Kalra et al.'s scheme, the security and efficiency have been enhanced.
Securely accessing the information from sensor nodes is the premier need and becomes the challenging area in wireless sensor networks (WSNs) and internet of things environment (IoT). Consequently, keeping up the protection of shared information, authentication assumes a vital role. Where after the mutual authentication, it makes the agreement of the session key among the participants. In this regard, Kalra et al.'s proposed a mechanism for client authentication and session key agreement, and guaranteed, their scheme is highly secured against many possible and well-known threats. However, in this paper, it has been demonstrated that their scheme can suffer from sensor node capturing attack, leakage of gateway node's secret key and also impractical for session key agreement. Further, an improved scheme has been proposed to conquer the security flaws of Kalra et al.'s scheme. In addition, to check the security properties and to prove the mutual authentication among the participant, the proposed scheme has been verified by ProVerif protocol verification tools. Finally, a comparative study with the other related schemes has also been defined to prove the efficiency of the proposed scheme.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available