Skip to main content

A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks

  • Conference paper
  • First Online:
Book cover Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2018 (AISI 2018)

Abstract

Recently, Internet of Things (IoT) is increasing pervasively, permits the unattended objects to be connected securely among themselves allowing highly classified processed data to be controlled. WSN has the most significant attention since transferring data is the most security challenge of the IoT environment. As well as, the previous messages which might be intercepted causing the established session key to be revealed. To mitigate such an attack, a lot of schemes were proposed, with an allegation of high efficient security features were achieved and powerful resilience against various attacks. After prudent studies have been made, we found that multiple proposed schemes do not support all the security requirements and are susceptible to some security attacks. In this paper, we propose a secure mutual authentication scheme with perfect forward-secrecy for WSN. Likewise, provides resilience against various types of known attacks in WSNs. Finally, the security of proposed scheme is proven.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alcaraz, C., Najera, P., Lopez, J., Roman, R.: WSNs and the internet of things do we need a complete integration? In: 1st International Workshop on the Security of the Internet of Things, SecIoT 2010. IEEE, Tokyo (2010)

    Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  Google Scholar 

  3. Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wirel. Commun. 11, 54–61 (2004)

    Article  Google Scholar 

  4. Akyildiz, E.A.: I.F.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  5. Stallings, W., Brown, L.: Computer Security: Principles and Practice, 2nd edn. Pearson Education, London (2011)

    Google Scholar 

  6. Pathan, A.S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. Phoenix Park, 20 February 2006, pp. 1043–1048. Institute of Electrical & Electronics Engineers (IEEE) (2006)

    Google Scholar 

  7. Xiong, L., Peng, D., Peng, T., Liang, H., Liu, Z.: A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors 17, 2681 (2017)

    Article  Google Scholar 

  8. Wei, J., Liu, W., Hu, X.: Secure and efficient smart card based remote user password authentication scheme. Int. J. Netw. Secur. 18(4), 782–792 (2016)

    Google Scholar 

  9. Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. Part I 36, 152–176 (2016)

    Article  Google Scholar 

  10. Yussoff, E.A.: Y.M.: A review of physical attacks and trusted platforms in wireless sensor networks. Procedia Eng. 41, 580–587 (2012)

    Article  Google Scholar 

  11. Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K.: A dynamic password-based user authentication scheme for hierarchical WSNs. J. Netw. Comput. Appl. 35, 1646–1656 (2012)

    Article  Google Scholar 

  12. Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2012)

    Article  Google Scholar 

  13. Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Comm. 8(3), 1086–1090 (2009)

    Article  Google Scholar 

  14. Wang, P.W.D.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73(14), 41–57 (2014)

    Article  Google Scholar 

  15. Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8, 1070–1081 (2014)

    Article  Google Scholar 

  16. Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme. Int. J. Commun Syst 27(2), 377–389 (2014)

    Article  Google Scholar 

  17. Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5), 321–325 (2010)

    Article  Google Scholar 

  18. Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Xu et al.’s authentication scheme using smart cards. In: Proceedings of the Third Annual ACM Bangalore Conference, p. 15 (2010)

    Google Scholar 

  19. Li, X., Niu, J., Khan, M.K., Liao, J.: An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5), 1365–1371 (2013)

    Article  Google Scholar 

  20. Kumari, S., Khan, M.K.: Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme. Int. J. Commun Syst 27(12), 3939–3955 (2014)

    Article  Google Scholar 

  21. Jiang, Q., Ma, J., Li, G., Li, X.: Improvement of robust smart-card-based password authentication scheme. Int. J. Commun Syst 28(2), 383–393 (2015)

    Article  Google Scholar 

  22. Turkanović, M., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96–112 (2014)

    Article  Google Scholar 

  23. Lu, Y., Li, L., Peng, H., Yang, Y.: An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors 16, 837 (2016)

    Article  Google Scholar 

  24. Jung, J., Kim, J., Choi, Y., Won, D.: An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors 16, 1299 (2016)

    Article  Google Scholar 

  25. Gope, P., Lee, J., Quek, T.Q.S.: Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens. J. 17(2), 498–503 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed M. Mansour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mansour, M.M., Salem, F.M., Saad, E.M. (2019). A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks. In: Hassanien, A., Tolba, M., Shaalan, K., Azar, A. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2018. AISI 2018. Advances in Intelligent Systems and Computing, vol 845. Springer, Cham. https://doi.org/10.1007/978-3-319-99010-1_41

Download citation

Publish with us

Policies and ethics