4.6 Article

A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks

Journal

IEEE ACCESS
Volume 8, Issue -, Pages 48285-48298

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.2979906

Keywords

Authentication; Logic gates; Underwater acoustics; Chaotic communication; Chebyshev approximation; Password; Authentication; chaotic maps; DHP; DLP; lightweight

Funding

  1. National Natural Science Foundation of China [61962052, 61902273]
  2. Innovation Team Foundation of Qinghai Office of Science and Technology [2020-ZJ-903]
  3. Key Laboratory of IoT of Qinghai [2020-ZJ-Y16]
  4. Hebei IoT Monitoring Center [3142016020]
  5. Research Fund for the Chunhui Program of Ministry of Education of China

Ask authors/readers for more resources

Underwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive and special, only authenticated users have rights to get the information. The existing secure resource-constrained authentication schemes are not inapplicable for underwater acoustic networks, so a lightweight authentication scheme is the primarily task in underwater acoustic networks. In this paper, we present a chaotic maps remote user authentication and key agreement scheme for underwater acoustic networks based on the DLP and DHP, in which only authenticated users have rights to obtain the information. The proposed scheme applies the lightweight cryptographic primitives, such as one-way hash function and chaotic maps to accomplish mutual authentication and key agreement for underwater acoustic networks. The security of the proposed scheme is certified by applying the BAN logic and Random Oracle Model. Security analysis shows that our proposed scheme is safe and can meet ten security requirements and seven security goals. Performance analysis shows that our proposed scheme is more efficient compared with other resource-constrained schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available