A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks

Underwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive...

Full description

Bibliographic Details
Main Authors: Shuailiang Zhang, Xiujuan Du, Xin Liu
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9031387/
_version_ 1818664477495656448
author Shuailiang Zhang
Xiujuan Du
Xin Liu
author_facet Shuailiang Zhang
Xiujuan Du
Xin Liu
author_sort Shuailiang Zhang
collection DOAJ
description Underwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive and special, only authenticated users have rights to get the information. The existing secure resource-constrained authentication schemes are not inapplicable for underwater acoustic networks, so a lightweight authentication scheme is the primarily task in underwater acoustic networks. In this paper, we present a chaotic maps remote user authentication and key agreement scheme for underwater acoustic networks based on the DLP and DHP, in which only authenticated users have rights to obtain the information. The proposed scheme applies the lightweight cryptographic primitives, such as one-way hash function and chaotic maps to accomplish mutual authentication and key agreement for underwater acoustic networks. The security of the proposed scheme is certified by applying the BAN logic and Random Oracle Model. Security analysis shows that our proposed scheme is safe and can meet ten security requirements and seven security goals. Performance analysis shows that our proposed scheme is more efficient compared with other resource-constrained schemes.
first_indexed 2024-12-17T05:33:22Z
format Article
id doaj.art-2ce402895ee94da6bcfa316d8c6a2ca9
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T05:33:22Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-2ce402895ee94da6bcfa316d8c6a2ca92022-12-21T22:01:40ZengIEEEIEEE Access2169-35362020-01-018482854829810.1109/ACCESS.2020.29799069031387A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic NetworksShuailiang Zhang0https://orcid.org/0000-0003-4158-7816Xiujuan Du1Xin Liu2Computer Department, Qinghai Normal University, Xining, ChinaComputer Department, Qinghai Normal University, Xining, ChinaComputer Department, Qinghai Normal University, Xining, ChinaUnderwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive and special, only authenticated users have rights to get the information. The existing secure resource-constrained authentication schemes are not inapplicable for underwater acoustic networks, so a lightweight authentication scheme is the primarily task in underwater acoustic networks. In this paper, we present a chaotic maps remote user authentication and key agreement scheme for underwater acoustic networks based on the DLP and DHP, in which only authenticated users have rights to obtain the information. The proposed scheme applies the lightweight cryptographic primitives, such as one-way hash function and chaotic maps to accomplish mutual authentication and key agreement for underwater acoustic networks. The security of the proposed scheme is certified by applying the BAN logic and Random Oracle Model. Security analysis shows that our proposed scheme is safe and can meet ten security requirements and seven security goals. Performance analysis shows that our proposed scheme is more efficient compared with other resource-constrained schemes.https://ieeexplore.ieee.org/document/9031387/Authenticationchaotic mapsDHPDLPlightweight
spellingShingle Shuailiang Zhang
Xiujuan Du
Xin Liu
A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
IEEE Access
Authentication
chaotic maps
DHP
DLP
lightweight
title A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
title_full A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
title_fullStr A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
title_full_unstemmed A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
title_short A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
title_sort secure remote mutual authentication scheme based on chaotic map for underwater acoustic networks
topic Authentication
chaotic maps
DHP
DLP
lightweight
url https://ieeexplore.ieee.org/document/9031387/
work_keys_str_mv AT shuailiangzhang asecureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks
AT xiujuandu asecureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks
AT xinliu asecureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks
AT shuailiangzhang secureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks
AT xiujuandu secureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks
AT xinliu secureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks