ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
Abstract In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilit...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2024-01-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-024-52134-z |
_version_ | 1797349930278322176 |
---|---|
author | Wenfeng Huang |
author_facet | Wenfeng Huang |
author_sort | Wenfeng Huang |
collection | DOAJ |
description | Abstract In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilities and are susceptible to security attacks (e.g., masquerading user, password guessing, internal privilege, and MITT attacks), so they cannot meet the anonymity requirements or achieve forward security. To effectively improve the security performance of WSNs, an elliptic curve cryptography (ECC)-based three-factor authentication and key agreement scheme for WSNs is proposed. The scheme is based on the ECC protocol and combines biometrics, smart card and password authentication technology; uses a challenge/response mechanism to complete the authentication between users, gateways, and sensors; and negotiates a secure session key. The Burrows, Abadi and Needham logic for formal security analysis proves the correctness and security of the scheme, and the informal analysis of multiple known attacks proves that the scheme can resist various attacks and has high security characteristics. The feasibility of the scheme has been analysed and verified with the ProVerif tool. The efficiency analysis results show that the scheme is suitable for resource-constrained WSNs. |
first_indexed | 2024-03-08T12:37:28Z |
format | Article |
id | doaj.art-6b02c2a844344980b13fa5efb23e2271 |
institution | Directory Open Access Journal |
issn | 2045-2322 |
language | English |
last_indexed | 2024-03-08T12:37:28Z |
publishDate | 2024-01-01 |
publisher | Nature Portfolio |
record_format | Article |
series | Scientific Reports |
spelling | doaj.art-6b02c2a844344980b13fa5efb23e22712024-01-21T12:20:56ZengNature PortfolioScientific Reports2045-23222024-01-0114112010.1038/s41598-024-52134-zECC-based three-factor authentication and key agreement scheme for wireless sensor networksWenfeng Huang0School of Information Engineering, Xiamen Ocean Vocational CollegeAbstract In wireless sensor networks (WSNs), protocols with authentication and key agreement functions can enhance the security of the interaction between users and sensor nodes, guaranteeing the security of user access and sensor node information. Existing schemes have various security vulnerabilities and are susceptible to security attacks (e.g., masquerading user, password guessing, internal privilege, and MITT attacks), so they cannot meet the anonymity requirements or achieve forward security. To effectively improve the security performance of WSNs, an elliptic curve cryptography (ECC)-based three-factor authentication and key agreement scheme for WSNs is proposed. The scheme is based on the ECC protocol and combines biometrics, smart card and password authentication technology; uses a challenge/response mechanism to complete the authentication between users, gateways, and sensors; and negotiates a secure session key. The Burrows, Abadi and Needham logic for formal security analysis proves the correctness and security of the scheme, and the informal analysis of multiple known attacks proves that the scheme can resist various attacks and has high security characteristics. The feasibility of the scheme has been analysed and verified with the ProVerif tool. The efficiency analysis results show that the scheme is suitable for resource-constrained WSNs.https://doi.org/10.1038/s41598-024-52134-z |
spellingShingle | Wenfeng Huang ECC-based three-factor authentication and key agreement scheme for wireless sensor networks Scientific Reports |
title | ECC-based three-factor authentication and key agreement scheme for wireless sensor networks |
title_full | ECC-based three-factor authentication and key agreement scheme for wireless sensor networks |
title_fullStr | ECC-based three-factor authentication and key agreement scheme for wireless sensor networks |
title_full_unstemmed | ECC-based three-factor authentication and key agreement scheme for wireless sensor networks |
title_short | ECC-based three-factor authentication and key agreement scheme for wireless sensor networks |
title_sort | ecc based three factor authentication and key agreement scheme for wireless sensor networks |
url | https://doi.org/10.1038/s41598-024-52134-z |
work_keys_str_mv | AT wenfenghuang eccbasedthreefactorauthenticationandkeyagreementschemeforwirelesssensornetworks |