z-logo
Premium
An efficient anonymous user authentication and key agreement protocol for wireless sensor networks
Author(s) -
Kumar Devender,
Grover Harmanpreet Singh,
Kaur Damandeep,
Verma Adarsh,
Saini Khushil Kumar,
Kumar Bijendra
Publication year - 2021
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4724
Subject(s) - computer science , forward secrecy , computer security , session key , wireless sensor network , authentication (law) , authentication protocol , computer network , protocol (science) , key (lock) , cryptographic protocol , security analysis , mutual authentication , anonymity , node (physics) , key agreement protocol , cryptography , public key cryptography , key distribution , encryption , medicine , alternative medicine , structural engineering , pathology , engineering
Summary Due to fast development of wireless technology, wireless sensor networks (WSNs) are used in many applications such environmental monitoring, health monitoring, and area monitoring. To protect WSNs from various security threats, many user authentication protocols have been proposed. Recently, Gope and Hwang have discussed an authentication protocol for WSNs. Here, we show that their scheme is not resistant to stolen verifier, user impersonation, smart card loss, and insider attacks. Also, it does not maintain secrecy of session key and anonymity of sensor node. Then we devise an efficient user authentication protocol using physically unclonable function (PUF) for WSNs to overcome the limitations of their scheme. We present our protocol's informal security analysis to show that is resistant to various known attacks. Formal security verification and analysis of the proposed protocol are done using ProVerif tool and widely accepted Real‐Or‐Random (ROR) model, respectively. In the performance analysis, we show that our protocol offers more security features than the others related schemes.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here