A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks
Underwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9031387/ |
_version_ | 1818664477495656448 |
---|---|
author | Shuailiang Zhang Xiujuan Du Xin Liu |
author_facet | Shuailiang Zhang Xiujuan Du Xin Liu |
author_sort | Shuailiang Zhang |
collection | DOAJ |
description | Underwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive and special, only authenticated users have rights to get the information. The existing secure resource-constrained authentication schemes are not inapplicable for underwater acoustic networks, so a lightweight authentication scheme is the primarily task in underwater acoustic networks. In this paper, we present a chaotic maps remote user authentication and key agreement scheme for underwater acoustic networks based on the DLP and DHP, in which only authenticated users have rights to obtain the information. The proposed scheme applies the lightweight cryptographic primitives, such as one-way hash function and chaotic maps to accomplish mutual authentication and key agreement for underwater acoustic networks. The security of the proposed scheme is certified by applying the BAN logic and Random Oracle Model. Security analysis shows that our proposed scheme is safe and can meet ten security requirements and seven security goals. Performance analysis shows that our proposed scheme is more efficient compared with other resource-constrained schemes. |
first_indexed | 2024-12-17T05:33:22Z |
format | Article |
id | doaj.art-2ce402895ee94da6bcfa316d8c6a2ca9 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-17T05:33:22Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-2ce402895ee94da6bcfa316d8c6a2ca92022-12-21T22:01:40ZengIEEEIEEE Access2169-35362020-01-018482854829810.1109/ACCESS.2020.29799069031387A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic NetworksShuailiang Zhang0https://orcid.org/0000-0003-4158-7816Xiujuan Du1Xin Liu2Computer Department, Qinghai Normal University, Xining, ChinaComputer Department, Qinghai Normal University, Xining, ChinaComputer Department, Qinghai Normal University, Xining, ChinaUnderwater acoustic networks (UANs) have emerged as a new wireless sensor network structure widely used in many applications. Sensor nodes are usually placed in a hostile and unattended underwater environment to gather information with limited resource. Since the underwater information is sensitive and special, only authenticated users have rights to get the information. The existing secure resource-constrained authentication schemes are not inapplicable for underwater acoustic networks, so a lightweight authentication scheme is the primarily task in underwater acoustic networks. In this paper, we present a chaotic maps remote user authentication and key agreement scheme for underwater acoustic networks based on the DLP and DHP, in which only authenticated users have rights to obtain the information. The proposed scheme applies the lightweight cryptographic primitives, such as one-way hash function and chaotic maps to accomplish mutual authentication and key agreement for underwater acoustic networks. The security of the proposed scheme is certified by applying the BAN logic and Random Oracle Model. Security analysis shows that our proposed scheme is safe and can meet ten security requirements and seven security goals. Performance analysis shows that our proposed scheme is more efficient compared with other resource-constrained schemes.https://ieeexplore.ieee.org/document/9031387/Authenticationchaotic mapsDHPDLPlightweight |
spellingShingle | Shuailiang Zhang Xiujuan Du Xin Liu A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks IEEE Access Authentication chaotic maps DHP DLP lightweight |
title | A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks |
title_full | A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks |
title_fullStr | A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks |
title_full_unstemmed | A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks |
title_short | A Secure Remote Mutual Authentication Scheme Based on Chaotic Map for Underwater Acoustic Networks |
title_sort | secure remote mutual authentication scheme based on chaotic map for underwater acoustic networks |
topic | Authentication chaotic maps DHP DLP lightweight |
url | https://ieeexplore.ieee.org/document/9031387/ |
work_keys_str_mv | AT shuailiangzhang asecureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks AT xiujuandu asecureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks AT xinliu asecureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks AT shuailiangzhang secureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks AT xiujuandu secureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks AT xinliu secureremotemutualauthenticationschemebasedonchaoticmapforunderwateracousticnetworks |