• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs


Abstract

For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
J. Li, Y. Zhang, L. Shen, J. Cao, W. Xie, Y. Zheng, S. Liu, "An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs," KSII Transactions on Internet and Information Systems, vol. 18, no. 3, pp. 801-825, 2024. DOI: 10.3837/tiis.2024.03.015.

[ACM Style]
Jiping Li, Yuanyuan Zhang, Lixiang Shen, Jing Cao, Wenwu Xie, Yi Zheng, and Shouyin Liu. 2024. An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs. KSII Transactions on Internet and Information Systems, 18, 3, (2024), 801-825. DOI: 10.3837/tiis.2024.03.015.

[BibTeX Style]
@article{tiis:90682, title="An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs", author="Jiping Li and Yuanyuan Zhang and Lixiang Shen and Jing Cao and Wenwu Xie and Yi Zheng and Shouyin Liu and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2024.03.015}, volume={18}, number={3}, year="2024", month={March}, pages={801-825}}