首页> 外文期刊>Concurrency, practice and experience >On the design of a secure user authentication and key agreement scheme for wireless sensor networks
【24h】

On the design of a secure user authentication and key agreement scheme for wireless sensor networks

机译:无线传感器网络安全用户认证和密钥协商方案的设计

获取原文
获取原文并翻译 | 示例

摘要

A wireless sensor network (WSN) typically consists of a large number of resource-constrained sensor nodes and several control or gateway nodes. Ensuring the security of the asymmetric nature of WSN is challenging, and designing secure and efficient user authentication and key agreement schemes for WSNs is an active research area. For example, in 2016, Farash et al. proposed a user authentication and key agreement scheme for WSNs. However, we reveal previously unpublished vulnerabilities in their scheme, which allow an attacker to carry out sensor node spoofing, password guessing, user/sensor node anonymity, and user impersonation attacks. We then present a scheme, which does not suffer from the identified vulnerabilities. To demonstrate the practicality of the scheme, we evaluate the scheme using NS-2 simulator. We then prove the scheme secure using Burrows–Abadi–Needham logic.
机译:无线传感器网络(WSN)通常由大量资源受限的传感器节点和几个控制或网关节点组成。确保WSN的非对称性质的安全性具有挑战性,为WSN设计安全高效的用户身份验证和密钥协商方案是一个积极的研究领域。例如,在2016年,Farash等人。提出了一种用于无线传感器网络的用户认证和密钥协商方案。但是,我们在其方案中揭示了以前未公开的漏洞,这些漏洞使攻击者可以执行传感器节点欺骗,密码猜测,用户/传感器节点匿名性和用户模拟攻击。然后,我们提出一种方案,该方案不存在已确定的漏洞。为了证明该方案的实用性,我们使用NS-2仿真器对该方案进行了评估。然后,我们使用Burrows-Abadi-Needham逻辑证明该方案的安全性。

著录项

  • 来源
    《Concurrency, practice and experience》 |2017年第23期|e3930.1-e3930.24|共24页
  • 作者单位

    Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh 250 005, India;

    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India;

    Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India;

    School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411 201, China,Nanjing University of Information Science and Technology, Nanjing 210044, China;

    Department of Computer Science and Engineering, Xiamen Institute of Technology, Xiamen 361021, China;

    Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX 78249, USA,School of Computer Science, China University of Geosciences, Wuhan, China,School of Information Technology & Mathematical Sciences, University of South Australia, Adelaide, SA, Australia;

    Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    wireless sensor networks; user authentication; key agreement; provable security; BAN logic; NS2 simulation;

    机译:无线传感器网络;用户认证;关键协议;可证明的安全性;BAN逻辑;NS2模拟;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号