A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion

As an important topic of IoT, wireless sensor network (WSN) data transmission is popular nowadays. It is widely accepted that the wireless channel is hazard, and multifactor authentication schemes are proposed to save the hazard of wireless communication circumstance. To overcome the problems, we give a fresh three-factor authentication scheme providing session keys for WSNs. Formal verification given by Proverif illustrates that the new scheme keeps security properties. At the same time, the informal analysis also denotes that the proposed scheme is practical and satisfies general needs, such as counteraction against various attacks and meeting security properties. Compared to some recent similar schemes, the proposed scheme performs better in security and is suitable for application. At last, we use NS-3 for simulation. The results from the simulation show that the scheme can run in IoT environment normally and has practical perspective.

[1]  Shehzad Ashraf Chaudhry,et al.  Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment” , 2019, IEEE Internet of Things Journal.

[2]  Jeroen Famaey,et al.  Implementation and Validation of an IEEE 802.11ah Module for ns-3 , 2016, WNS3.

[3]  Changjun Jiang,et al.  A biometric-based user authentication for wireless sensor networks , 2010, Wuhan University Journal of Natural Sciences.

[4]  Jian Ma,et al.  A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments , 2013, Math. Comput. Model..

[5]  Sherali Zeadally,et al.  Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.

[6]  Ying Chen,et al.  An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks , 2019, IEEE Access.

[7]  Mznah Al-Rodhaan,et al.  An Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[8]  Hye-Jin Kim,et al.  An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..

[9]  Xiong Li,et al.  An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..

[10]  Fan Wu,et al.  A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.

[11]  Jin Wang,et al.  Lightweight deep network for traffic sign classification , 2019, Annals of Telecommunications.

[12]  Muhammad Khurram Khan,et al.  Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.

[13]  Xiong Li,et al.  Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..

[14]  Eun-Jun Yoon,et al.  A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[15]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[16]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[17]  Ashok Kumar Das,et al.  A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[18]  Chun Chen,et al.  An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.

[19]  Shiming He,et al.  PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid , 2017, KSII Trans. Internet Inf. Syst..

[20]  Kim-Kwang Raymond Choo,et al.  White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography , 2020, IACR Cryptol. ePrint Arch..

[21]  Xiong Li,et al.  A new and secure authentication scheme for wireless sensor networks with formal proof , 2017, Peer-to-Peer Netw. Appl..

[22]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[23]  Xiong Li,et al.  An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..

[24]  Carmen Sánchez Ávila,et al.  Biometric Fuzzy Extractor Scheme for Iris Templates , 2009, Security and Management.

[25]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[26]  Wei-Kuan Shih,et al.  A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .

[27]  Athanasios V. Vasilakos,et al.  Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment , 2018, IEEE Internet of Things Journal.

[28]  Dariush Abbasinezhad-Mood,et al.  Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..

[29]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[30]  Saru Kumari,et al.  An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.

[31]  Xiong Li,et al.  An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.

[32]  Hoon-Jae Lee,et al.  Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks , 2011, 2011 Wireless Advanced.

[33]  Arun Kumar Sangaiah,et al.  An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019, Human-centric Computing and Information Sciences.

[34]  Xiong Li,et al.  A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography , 2019, IEEE Systems Journal.

[35]  Kenichi Mori,et al.  IEEE 802.11ah , 2016 .

[36]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[37]  Ashok Kumar Das Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2014, SSCC.

[38]  Jianfeng Ma,et al.  An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..

[39]  Feng Li,et al.  Parameters Compressing in Deep Learning , 2020 .

[40]  Sungyoung Lee,et al.  A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs , 2017, Cluster Computing.

[41]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.