Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security

  • PDF / 2,312,289 Bytes
  • 27 Pages / 439.37 x 666.142 pts Page_size
  • 69 Downloads / 283 Views

DOWNLOAD

REPORT


Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security A. Jabbari1 · J. B. Mohasefi2 

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract The internet of things (IoT) is the network of physical devices embedded with types of equipment which enables them to connect and exchange data. The IoT will provide an excellent chance for the integration of the physical world into computer-based systems. Wireless sensor networks (WSNs) are considered as a critical component of IoT networks, and user authentication is a cardinal issue in WSNs. Recently, Wu et al. (J Ambient Intell Humaniz Comput 8(1):101–116, 2017) proposed a new user authentication scheme for wireless sensor networks based on the Internet of Things security. This scheme is more valuable. Because it does not uses timestamps. Also, it provides strong forward security, it can resist the de-synchronization problem, and it is efficient. Unfortunately, in this paper, we will prove that Wu et al.’s scheme is vulnerable to user impersonation attack, gateway impersonation attack, man-in-the-middle attack, and sensor impersonation attack. Furthermore, we show that this scheme can not guarantee user anonymity. It is much worth to design a new security protocol with the same advantages as those of Wu et al.’s scheme. Therefore, we have put forward some improvements to dominate the weaknesses of Wu et al.’s protocol. We use the random oracle model to demonstrate the formal proof, and the security verification tool Proverif to demonstrate that the proposal can satisfy security and authentication features. The performance analysis and simulation results by NS2 indicate that the proposed protocol is efficient. Keywords  Internet of things · Wireless sensor network · User authentication · Elliptic curve cryptography · Protocol security

* J. B. Mohasefi [email protected]; [email protected]

A. Jabbari [email protected]; [email protected]

1

Department of Computer Engineering, Urmia University, Urmia, Iran

2

Department of Computer Engineering, Urmia University, Urmia, Iran



13

Vol.:(0123456789)



A. Jabbari, J. B. Mohasefi

1 Introduction Internet of things (IoT) is constituted of different kinds of devices such as sensors, actuators, and smart devices that are connected together in order to collect and transfer data across the Internet [1]. IoT serves a significant role in various domains including industrial automation, healthcare, transportation, agriculture, vehicle and smart home [2–4]. One of the most significant components of IoT is wireless sensor networks (WSNs) because they cover an extensive application range [5]. A wireless sensor network composed of gateways, sensor nodes and users in IoT [6]. Fundamentally, a gateway can interact with each sensor node. The sensor nodes and the users should register on the gateway. Hence, the users can reach the sensor nodes and access the real-time data, sensed by the sensor nodes, through the gateway [7]. In WSNs, it