ECC-based three-factor authentication and key agreement scheme for wireless sensor networks

Abstract In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilit...

Full description

Bibliographic Details
Main Author: Wenfeng Huang
Format: Article
Language:English
Published: Nature Portfolio 2024-01-01
Series:Scientific Reports
Online Access:https://doi.org/10.1038/s41598-024-52134-z
_version_ 1797349930278322176
author Wenfeng Huang
author_facet Wenfeng Huang
author_sort Wenfeng Huang
collection DOAJ
description Abstract In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilities and are susceptible to security attacks (e.g., masquerading user, password guessing, internal privilege, and MITT attacks), so they cannot meet the anonymity requirements or achieve forward security. To effectively improve the security performance of WSNs, an elliptic curve cryptography (ECC)-based three-factor authentication and key agreement scheme for WSNs is proposed. The scheme is based on the ECC protocol and combines biometrics, smart card and password authentication technology; uses a challenge/response mechanism to complete the authentication between users, gateways, and sensors; and negotiates a secure session key. The Burrows, Abadi and Needham logic for formal security analysis proves the correctness and security of the scheme, and the informal analysis of multiple known attacks proves that the scheme can resist various attacks and has high security characteristics. The feasibility of the scheme has been analysed and verified with the ProVerif tool. The efficiency analysis results show that the scheme is suitable for resource-constrained WSNs.
first_indexed 2024-03-08T12:37:28Z
format Article
id doaj.art-6b02c2a844344980b13fa5efb23e2271
institution Directory Open Access Journal
issn 2045-2322
language English
last_indexed 2024-03-08T12:37:28Z
publishDate 2024-01-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj.art-6b02c2a844344980b13fa5efb23e22712024-01-21T12:20:56ZengNature PortfolioScientific Reports2045-23222024-01-0114112010.1038/s41598-024-52134-zECC-based three-factor authentication and key agreement scheme for wireless sensor networksWenfeng Huang0School of Information Engineering, Xiamen Ocean Vocational CollegeAbstract In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilities and are susceptible to security attacks (e.g., masquerading user, password guessing, internal privilege, and MITT attacks), so they cannot meet the anonymity requirements or achieve forward security. To effectively improve the security performance of WSNs, an elliptic curve cryptography (ECC)-based three-factor authentication and key agreement scheme for WSNs is proposed. The scheme is based on the ECC protocol and combines biometrics, smart card and password authentication technology; uses a challenge/response mechanism to complete the authentication between users, gateways, and sensors; and negotiates a secure session key. The Burrows, Abadi and Needham logic for formal security analysis proves the correctness and security of the scheme, and the informal analysis of multiple known attacks proves that the scheme can resist various attacks and has high security characteristics. The feasibility of the scheme has been analysed and verified with the ProVerif tool. The efficiency analysis results show that the scheme is suitable for resource-constrained WSNs.https://doi.org/10.1038/s41598-024-52134-z
spellingShingle Wenfeng Huang
ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
Scientific Reports
title ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
title_full ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
title_fullStr ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
title_full_unstemmed ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
title_short ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
title_sort ecc based three factor authentication and key agreement scheme for wireless sensor networks
url https://doi.org/10.1038/s41598-024-52134-z
work_keys_str_mv AT wenfenghuang eccbasedthreefactorauthenticationandkeyagreementschemeforwirelesssensornetworks