An Authentication Information Exchange Scheme in WSN for IoT Applications

Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireles...

Full description

Bibliographic Details
Main Authors: Sheng-Kai Yang, Ya-Ming Shiue, Zhi-Yuan Su, I-Hsien Liu, Chuan-Gang Liu
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8952657/
_version_ 1819169971010273280
author Sheng-Kai Yang
Ya-Ming Shiue
Zhi-Yuan Su
I-Hsien Liu
Chuan-Gang Liu
author_facet Sheng-Kai Yang
Ya-Ming Shiue
Zhi-Yuan Su
I-Hsien Liu
Chuan-Gang Liu
author_sort Sheng-Kai Yang
collection DOAJ
description Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel authentication information exchange scheme in WSN, which is very different from the previous authentication researches. Our idea is to add an authentication information exchange scheme in previous authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an authentication information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our authentication information exchange scheme can achieve security features and goals.
first_indexed 2024-12-22T19:27:58Z
format Article
id doaj.art-420b166f51f3492fa9fbb3be85cc8b34
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-22T19:27:58Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-420b166f51f3492fa9fbb3be85cc8b342022-12-21T18:15:11ZengIEEEIEEE Access2169-35362020-01-0189728973810.1109/ACCESS.2020.29648158952657An Authentication Information Exchange Scheme in WSN for IoT ApplicationsSheng-Kai Yang0Ya-Ming Shiue1Zhi-Yuan Su2I-Hsien Liu3Chuan-Gang Liu4https://orcid.org/0000-0001-9019-896XDepartment of Information Management, Chia Nan University of Pharmacy and Science, Tainan, TaiwanDepartment of Applied Informatics and Multimedia, Chia Nan University of Pharmacy and Science, Tainan, TaiwanDepartment of Information Management, Chia Nan University of Pharmacy and Science, Tainan, TaiwanDepartment of Electrical Engineering, Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, TaiwanDepartment of Applied Informatics and Multimedia, Chia Nan University of Pharmacy and Science, Tainan, TaiwanRecently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel authentication information exchange scheme in WSN, which is very different from the previous authentication researches. Our idea is to add an authentication information exchange scheme in previous authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an authentication information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our authentication information exchange scheme can achieve security features and goals.https://ieeexplore.ieee.org/document/8952657/Authentication protocolnode captured attackIoTwireless sensor networks
spellingShingle Sheng-Kai Yang
Ya-Ming Shiue
Zhi-Yuan Su
I-Hsien Liu
Chuan-Gang Liu
An Authentication Information Exchange Scheme in WSN for IoT Applications
IEEE Access
Authentication protocol
node captured attack
IoT
wireless sensor networks
title An Authentication Information Exchange Scheme in WSN for IoT Applications
title_full An Authentication Information Exchange Scheme in WSN for IoT Applications
title_fullStr An Authentication Information Exchange Scheme in WSN for IoT Applications
title_full_unstemmed An Authentication Information Exchange Scheme in WSN for IoT Applications
title_short An Authentication Information Exchange Scheme in WSN for IoT Applications
title_sort authentication information exchange scheme in wsn for iot applications
topic Authentication protocol
node captured attack
IoT
wireless sensor networks
url https://ieeexplore.ieee.org/document/8952657/
work_keys_str_mv AT shengkaiyang anauthenticationinformationexchangeschemeinwsnforiotapplications
AT yamingshiue anauthenticationinformationexchangeschemeinwsnforiotapplications
AT zhiyuansu anauthenticationinformationexchangeschemeinwsnforiotapplications
AT ihsienliu anauthenticationinformationexchangeschemeinwsnforiotapplications
AT chuangangliu anauthenticationinformationexchangeschemeinwsnforiotapplications
AT shengkaiyang authenticationinformationexchangeschemeinwsnforiotapplications
AT yamingshiue authenticationinformationexchangeschemeinwsnforiotapplications
AT zhiyuansu authenticationinformationexchangeschemeinwsnforiotapplications
AT ihsienliu authenticationinformationexchangeschemeinwsnforiotapplications
AT chuangangliu authenticationinformationexchangeschemeinwsnforiotapplications