4.6 Article

A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion

Journal

IEEE SYSTEMS JOURNAL
Volume 15, Issue 1, Pages 1120-1129

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2020.2981049

Keywords

Wireless sensor networks; Authentication; Biometrics (access control); Password; Protocols; Computer science; Authentication; three-factor authentication; NS-3; wireless sensor network (WSN); proverif

Funding

  1. Program for New Century Excellent Talents in Fujian Province University (2018)
  2. University Distinguished Young Research Talent Training Program of Fujian Province (2016)
  3. Scientific Research Fund of Hunan Provincial Education Department [18A178]
  4. Natural Science Foundation of Hunan Province, China [2018JJ3191]

Ask authors/readers for more resources

The study introduces a new three-factor authentication scheme for providing session keys to wireless sensor networks. Formal and informal verification demonstrate that the scheme has good security and practicality. Simulation results show that the scheme can operate normally in IoT environments with promising practical applications.
As an important topic of IoT, wireless sensor network (WSN) data transmission is popular nowadays. It is widely accepted that the wireless channel is hazard, and multifactor authentication schemes are proposed to save the hazard of wireless communication circumstance. To overcome the problems, we give a fresh three-factor authentication scheme providing session keys for WSNs. Formal verification given by Proverif illustrates that the new scheme keeps security properties. At the same time, the informal analysis also denotes that the proposed scheme is practical and satisfies general needs, such as counteraction against various attacks and meeting security properties. Compared to some recent similar schemes, the proposed scheme performs better in security and is suitable for application. At last, we use NS-3 for simulation. The results from the simulation show that the scheme can run in IoT environment normally and has practical perspective.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available