User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks

  • PDF / 2,014,474 Bytes
  • 22 Pages / 595.276 x 790.866 pts Page_size
  • 95 Downloads / 181 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789(). ,- volV)

User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks Abdollah Jabbari1 • Jamshid B. Mohasefi1

Ó Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Authenticated key establishment schemes allow the participants to authenticate each other and establish a secure session key among them. These schemes play an important role in providing security and privacy in different applications. Security and privacy are very significant issues in critical applications in the Internet of Things. The present authenticated key establishment schemes in wireless sensor networks (WSNs) can not provide mutual authentication between participants. Therefore, this subject causes some security vulnerabilities for critical applications in the WSNs. In this paper, we will prove that, when an attacker is an insider adversary, the present schemes are vulnerable to user impersonation attack, sensor impersonation attack, and man-in-the-middle attack. Therefore, in order to dominate these vulnerabilities, we have proposed a new secure authenticated key establishment scheme. We have conducted formal proof using the random oracle model to show that the proposed scheme is secure. Furthermore, we applied Proverif to show that the proposed protocol can satisfy security and authentication properties. Moreover, we demonstrate that our proposed protocol is comparable in communication and computation overhead as compared to other relevant schemes. Ultimately, we present the practical demonstration of our scheme using the NS2 simulator. Keywords Authenticated key establishment  Wireless sensor network  Internet of Things  Elliptic curve cryptography

1 Introduction Internet of Things (IoT) is specified as a combination of physical objects that are connected together for collecting and exchanging information over the Internet [1, 2]. These physical objects equipped with sensors and actuators can be deployed in various environments. IoT can be employed in various applications such as smart transportation, industrial automation, smart healthcare system, vehicular networks, agriculture, and smart home [3–6]. Wireless sensor networks (WSNs) play a special role in IoT, whereas they cover a wide application range [7, 8]. A wireless sensor network constituted of sensor nodes, gateways, and users in IoT [9]. Initially, the sensor nodes and & Jamshid B. Mohasefi [email protected]; [email protected] Abdollah Jabbari [email protected]; [email protected] 1

Department of Computer Engineering, Urmia University, Urmia, Iran

the users must be registered on the gateway. The gateway can directly connect with all sensor nodes. However, users can have access to sensor nodes through the gateway [10]. For many critical applications in WSNs, users are interested to have real-time data acquisition from the sensor nodes [11]. In WSNs, it is compulsory to supply confidentiality and integrity of data collected by sensor nodes. Furth