4.2 Article

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

出版社

SPRINGER HEIDELBERG
DOI: 10.1007/s12652-016-0345-8

关键词

Internet of Things; Wireless sensor network; Mutual authentication; Formal proof; Smart card

资金

  1. Fujian Education and Scientific Research Program for Young and Middle-aged Teachers [JA14369]
  2. National Natural Science Foundation of China [61300220]
  3. PAPD
  4. CICAEET

向作者/读者索取更多资源

The notion Internet of Things (IoT) means all things in the global network can be interconnected and accessed. Wireless sensor network (WSN) is one of the most important applications of the notion and is widely used in nearly all scopes. In 2014, Hsieh et al. presented an improved authentication scheme for WSNs. But it has several weaknesses, including no session key, lack of mutual authentication and under the insider attack, the off-line guessing attack, the user forgery attack and the sensor capture attack. To avoid the weaknesses, we present a new authentication scheme which is also for WSNs. Then we employ the random oracle model to show the formal proof, and use the protocol analyzing tool Proverif to list the formal verification process. Compared with some recent schemes for WSNs via the aspects of security properties, the proposed scheme overcomes the common problems and fits for the security properties of IoT.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据