4.7 Article

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

期刊

COMPUTER NETWORKS
卷 101, 期 -, 页码 42-62

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2016.01.006

关键词

Anonymity preserving; Key exchange protocol; Wireless sensor network; Internet of Things; Sensor node; Gateway node

资金

  1. Indian School of Mines, Dhanbad, India
  2. OPERA award, BITS Pilani, Rajasthan, India
  3. Deanship of Scientific Research at King Saud University [PRG-1436-16]
  4. National Natural Science Foundation of China [61305010]
  5. Science and Technology Research Project of Education Department of Jiangxi Province [GJJ150715]
  6. Voyage Project of Jiangxi Province [201450]
  7. Open Foundation of Key Laboratory of Jiangxi Province for Image Processing and Pattern Recognition
  8. Key Foundation of Sichuan Development Research Center of Cultural Industries [WHCY2014A9]

向作者/读者索取更多资源

Recently, Farash et al. pointed out some security weaknesses of Turkanovic et al.'s protocol, which they extended to enhance its security. However, we found some problems with Farash et al.'s protocol, such as a known session-specific temporary information attack, an off-line password-guessing attack using a stolen-smartcard, a new-smartcard-issue attack, and a user-impersonation attack. Additionally, their protocol cannot preserve user anonymity, and the secret key of the gateway node is insecure. The main intention of this paper is to design an efficient and robust smartcard-based user authentication and session key agreement protocol for wireless sensor networks that use the Internet of Things. We analyze its security, proving that our protocol not only overcomes the weaknesses of Farash et al.'s protocol, but also preserves additional security attributes, such as the identity change and smartcard revocation phases. Moreover, the results of a simulation using AVISPA show that our protocol is secure against active and passive attacks. The security and performance of our work are also compared with a number of related protocols. (C) 2016 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据