An improved user authentication protocol for wireless sensor networks
Wireless sensor networks (WSNs) have its applications in many domains such as agriculture, medicine, safety, and industry. Due to its wireless channel, it is vulnerable to many security threats. To provide end‐to‐end secure communication, various authentication and key agreement protocols have been...
Gespeichert in:
Veröffentlicht in: | Transactions on emerging telecommunications technologies 2019-10, Vol.30 (10), p.n/a |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Wireless sensor networks (WSNs) have its applications in many domains such as agriculture, medicine, safety, and industry. Due to its wireless channel, it is vulnerable to many security threats. To provide end‐to‐end secure communication, various authentication and key agreement protocols have been discussed. Recently, Li et al have designed a mutual authentication and key agreement protocol for WSNs. However, it is found that this scheme does not resist to offline password guessing, device stolen, insider, and replay attacks besides user traceability problem. In this paper, a mutual authentication and key agreement protocol by overcoming the deficiencies of their scheme is proposed. Its formal security verification is shown using ProVerif tool. Its performance analysis is presented in terms of communication cost, computational cost, storage cost, and security features along with the other related schemes. It offers more security features than the other related schemes.
In this paper, cryptanalysis of Li et al.'s user authentication scheme for wireless sensor networks is done and it is found that it is vulnerable to the offline password guessing, device stolen, insider and replay attacks besides the user traceability problem. It is proposed an improved scheme by overcoming its drawbacks. Its formal security verification is shown using ProVerif tool. It is shown informally that it is resistant to the various known attacks and provides more security features. |
---|---|
ISSN: | 2161-3915 2161-3915 |
DOI: | 10.1002/ett.3745 |