首页> 外文期刊>Ad hoc networks >An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
【24h】

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

机译:针对物联网环境量身定制的异构无线传感器网络的高效用户认证和密钥协商方案

获取原文
获取原文并翻译 | 示例
       

摘要

The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working on new techniques and efficient approaches on how to integrate WSN better into the IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanovic et al.'s proposed a highly efficient and novel user authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the JOT notion. Their scheme presented a novel approach where a user from the JOT can authenticate with a specific sensor node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfortunately we have found that Turkanovic et al.'s scheme has some security shortcomings and is susceptible to some cryptographic attacks. This paper focuses on overcoming the security weaknesses of Turkanovic et al.'s scheme, by proposing a new and improved UAKAS. The proposed scheme enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools confirm the security properties of the proposed scheme. (C) 2015 Elsevier B.V. All rights reserved.
机译:物联网(IOT)的概念已经摆在我们的面前,它是指互联网基础架构(II)中的每个对象都互连到一个全球动态扩展的网络中。传感器和智能对象是IOT的传统计算设备的主要参与者。我们已经可以通过使用各种可穿戴设备或智能手机来利用物联网的好处,这些可穿戴设备或智能手机充满了各种传感器和执行器,并通过GPRS或Wi-Fi连接到II。由于传感器是物联网的关键部分,因此无线传感器网络(WSN)也是如此。研究人员已经在研究如何将WSN更好地集成到IOT环境中的新技术和有效方法。一方面是集成的安全性。最近,Turkanovic等人针对异构WSN(HWSN)提出了一种高效且新颖的用户身份验证和密钥协商方案(UAKAS),该方案已适应JOT概念。他们的方案提出了一种新颖的方法,即JOT中的用户可以与HWSN中的特定传感器节点进行身份验证,而不必与网关节点进行通信。此外,由于其基于简单的对称密码系统,因此它们的方案非常高效。不幸的是,我们发现Turkanovic等人的方案存在一些安全缺陷,并且容易受到某些密码攻击。本文着重于通过提出一种新的和改进的UAKAS来克服Turkanovic等人方案的安全性弱点。所提出的方案实现了相同的功能,但提高了安全级别,并使HWSN可以动态增长,而不会影响参与UAKAS的任何一方。通过BAN-logic和AVISPA工具进行的安全性分析结果证实了该方案的安全性。 (C)2015 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号