An Authentication Information Exchange Scheme in WSN for IoT Applications
Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireles...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8952657/ |
_version_ | 1819169971010273280 |
---|---|
author | Sheng-Kai Yang Ya-Ming Shiue Zhi-Yuan Su I-Hsien Liu Chuan-Gang Liu |
author_facet | Sheng-Kai Yang Ya-Ming Shiue Zhi-Yuan Su I-Hsien Liu Chuan-Gang Liu |
author_sort | Sheng-Kai Yang |
collection | DOAJ |
description | Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel authentication information exchange scheme in WSN, which is very different from the previous authentication researches. Our idea is to add an authentication information exchange scheme in previous authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an authentication information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our authentication information exchange scheme can achieve security features and goals. |
first_indexed | 2024-12-22T19:27:58Z |
format | Article |
id | doaj.art-420b166f51f3492fa9fbb3be85cc8b34 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-22T19:27:58Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-420b166f51f3492fa9fbb3be85cc8b342022-12-21T18:15:11ZengIEEEIEEE Access2169-35362020-01-0189728973810.1109/ACCESS.2020.29648158952657An Authentication Information Exchange Scheme in WSN for IoT ApplicationsSheng-Kai Yang0Ya-Ming Shiue1Zhi-Yuan Su2I-Hsien Liu3Chuan-Gang Liu4https://orcid.org/0000-0001-9019-896XDepartment of Information Management, Chia Nan University of Pharmacy and Science, Tainan, TaiwanDepartment of Applied Informatics and Multimedia, Chia Nan University of Pharmacy and Science, Tainan, TaiwanDepartment of Information Management, Chia Nan University of Pharmacy and Science, Tainan, TaiwanDepartment of Electrical Engineering, Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan, TaiwanDepartment of Applied Informatics and Multimedia, Chia Nan University of Pharmacy and Science, Tainan, TaiwanRecently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel authentication information exchange scheme in WSN, which is very different from the previous authentication researches. Our idea is to add an authentication information exchange scheme in previous authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an authentication information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our authentication information exchange scheme can achieve security features and goals.https://ieeexplore.ieee.org/document/8952657/Authentication protocolnode captured attackIoTwireless sensor networks |
spellingShingle | Sheng-Kai Yang Ya-Ming Shiue Zhi-Yuan Su I-Hsien Liu Chuan-Gang Liu An Authentication Information Exchange Scheme in WSN for IoT Applications IEEE Access Authentication protocol node captured attack IoT wireless sensor networks |
title | An Authentication Information Exchange Scheme in WSN for IoT Applications |
title_full | An Authentication Information Exchange Scheme in WSN for IoT Applications |
title_fullStr | An Authentication Information Exchange Scheme in WSN for IoT Applications |
title_full_unstemmed | An Authentication Information Exchange Scheme in WSN for IoT Applications |
title_short | An Authentication Information Exchange Scheme in WSN for IoT Applications |
title_sort | authentication information exchange scheme in wsn for iot applications |
topic | Authentication protocol node captured attack IoT wireless sensor networks |
url | https://ieeexplore.ieee.org/document/8952657/ |
work_keys_str_mv | AT shengkaiyang anauthenticationinformationexchangeschemeinwsnforiotapplications AT yamingshiue anauthenticationinformationexchangeschemeinwsnforiotapplications AT zhiyuansu anauthenticationinformationexchangeschemeinwsnforiotapplications AT ihsienliu anauthenticationinformationexchangeschemeinwsnforiotapplications AT chuangangliu anauthenticationinformationexchangeschemeinwsnforiotapplications AT shengkaiyang authenticationinformationexchangeschemeinwsnforiotapplications AT yamingshiue authenticationinformationexchangeschemeinwsnforiotapplications AT zhiyuansu authenticationinformationexchangeschemeinwsnforiotapplications AT ihsienliu authenticationinformationexchangeschemeinwsnforiotapplications AT chuangangliu authenticationinformationexchangeschemeinwsnforiotapplications |