A New Lightweight User Authentication and Key Agreement Scheme for WSN

  • PDF / 1,795,387 Bytes
  • 23 Pages / 439.37 x 666.142 pts Page_size
  • 28 Downloads / 198 Views

DOWNLOAD

REPORT


A New Lightweight User Authentication and Key Agreement Scheme for WSN Foroozan Ghosairi Darbandeh1 · Masoumeh Safkhani1 

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract The Internet of Things (IoT) is one of the most up-to-date and newest technologies that allows remote control of heterogeneous networks and has a good outlook for industrial applications. Wireless sensor networks (or in brief WSNs) have a key role on the Internet of industrial objects. Due to the limited resources of the sensor nodes, designing a balanced authentication scheme to provide security in reasonable performance in wireless sensor networks is a major challenge in these applications. So far, several security schemes have been presented in this context, but unfortunately, none of these schemes have provided desired security in reasonable cost. In 2017, Khemissa et al. proposed a security protocol for mutual authentication between sensor node and user in WSNs, however, in this paper we show that this protocol is not safe enough in the confrontation of desynchronization, user impersonation and gateway impersonation attacks. The proposed attacks succeed with the probability of one and to be realized only require an execution of the protocol. Given merits of the Khemissa et al.’s protocol, we also improved their protocol in such a way that provides suitable level of security, and also we prove its security using two formal ways, i.e. BAN logic and also the Scyther tool. We also argue informally about the improved protocol’s security. Keywords  Internet of Things · Wireless sensor networks · Authentication · Desynchronization attack · User impersonation attack · Gateway impersonation attack · BAN logic · Scyther tool

1 Introduction A wide range of applications that use Internet of Things (IoT) technology has been developing in recent years. IoT enables remote control through technologies such as RFID and WSNs across heterogeneous networks for specific purposes [19]. WSNs consist of * Masoumeh Safkhani [email protected] Foroozan Ghosairi Darbandeh [email protected] 1



Faculty of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran 16788‑15811, Iran

13

Vol.:(0123456789)



F. G. Darbandeh, M. Safkhani

a number of sensor nodes with limited energy and memory resources that communicate with each other through wireless communications. They are used in many industrial processes such as monitoring and managing processes, monitoring the correct functioning of machines, and detecting errors and collecting information about the environment [17]. Therefore, it can be said that WSNs have a critical role to play in the industrial environment of the Internet of Things. Due to wireless networks sensors limited computing and storage capabilities, and the insecure wireless channels and the low security of these communication channels, security is one of the most challenging issues in the WSNs [14]. The development of WSNs has made it possible for users to access sensor node’s data at any location, so