Font Size: a A A

Research On Authentication Scheme For Wireless Sensor Networks

Posted on:2020-08-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:1368330596986687Subject:computer science and Technology
Abstract/Summary:PDF Full Text Request
With the development of microelectronics technology,computer technology and wireless communication technology,sensor nodes have been rapidly developed.Wireless sensor networks(WSNs),which consist of a large number of sensor nodes,are widely used.WSNs realizes the digitization of physical environment and connect physical environment with network through the deployment of sensor nodes in the target area.With the widely used of WSNs,it brings convenience to person.Howerer,due to its own resource limitations,the traditional security methods cannot be used in WSNs and it will face great challenges in terms of security.How to achieve all the security requirements with relatively small overhead has become the hot and difficult point in this research field.As the precondition of the whole WSNs security,authentication scheme has become the most core technology and the basis of data access.Authentication scheme can verify the legality of entities and negotiate the secret key for future communication.Aiming at achieving all security requirements with relatively small energy consumption,this paper proposes two new security requirements after full research on authentication and key agreement schemes.At the same time,we proposed four authentication and key agreement schemes for various applications and different algorithms.Through the security analysis,simulation experiment and energy consumption analysis,all the proposed authentication schemes can achieve all the security requirements with relatively consumption and they are all correct,practical and advanced.In this paper,we summarized our main work as follows:1.After fully study on the traditional security model and research works,we found that if a previously registered legal user turns to a malicious user,the majority of research works cannot resist the malicious user.Malicious user can easily obtain data from all the sensor nodes.To solve this issue,we adopt separation of authority method to resist malicious user attack.This innovation requires every sensor nodes must be registered by legal user in gateway node.This method minimized the threat of malicious user attack to WSNs and the security analysis proves the correctness of this innovation.2.After fully study on the previous works,the majority of authentication schemes cannot resist the sensor node tracking attack.In some special application,as the sensor nodes are directly deployed with user,adversary can track user by tracing sensor nodes.This vulnerability will bring threats to user's privacy.In order to solve this security issue,this paper adopts the dynamic anonymous identity for sensor nodes,which is applied in four proposed improved schemes.According to the results of security and energy consumption analysis,this method can successfully resist the sensor nodes tracing attack with little computational increment.3.In this paper,we research on the authentication scheme based on elliptic curve encryption.After fully studying the authentication scheme proposed by Nam et al.,we found that the scheme cannot resist Dos attack,replay attack,session key guessing attack and node capture attack.In addition to this,Nam et al.' scheme does not provide some practical additional functions.In order to solve these issues,we propose an authentication scheme based on elliptic curve and dynamic identification.The correctness of the scheme is proved by BAN logic formal analysis and AVISPA simulation experiment.Therefore,the proposed scheme is secure and reliable.Through rigorous security,energy consumption and OPNET simulation experiment analysis results,the protocol can achieve all the security and functional requirements with relatively small energy consumption and end-to-end delay.Therefore,the proposed scheme is advanced.4.As the elliptic curve has complex calculation and large communication overhead,it is not suitable for WSNs.In order to reduce the overhead of authentication overhead,we proposed an authentication scheme based on lightweight encryption algorithm and dynamic identity.This proposed scheme achieves mutual authentication and key agreement among the user,gateway and sensor nodes.The correctness and applicability of the scheme is proved by BAN logic formal analysis and AVISPA simulation experiment.Through the results of security,energy consumption and OPNET simulation experiment analysis,the scheme can achieve all the safety and functional requirements with relatively small energy consumption and end-to-end delay.Therefore,the proposed scheme is advanced.5.In order to further improve security and reduce the energy consumption,this paper proposed an authentication scheme based on dynamic random numbers on the basis of the proposed scheme.In this scheme,random numbers and timestamps,which are generated by each authentication around,are used as dynamic authentication factors to complete the irregular dynamic change of anonymous identity for user and sensor nodes.BAN logic formal analysis and AVISPA simulation experiment proved the correctness and applicability of the proposed protocol.Through rigorous security,energy consumption and OPNET simulation experiment analysis results,the protocol can achieve all security and functional requirements with relatively small energy consumption and end-to-end delay.Therefore,the proposed scheme is advanced.6.There exists one application of WSNs that the user is mobile.In this dynamic network topology,the authentication scheme not only needs to achieve all the previous security requirements,but also needs to achieve fast and continuous authentication.In addition to this,the secret communication key must be negotiated between users.In this paper,after studying Zhong et al.'s scheme,we found that their scheme cannot resist smart card stolen attack,offline guess attack and other related attacks.Furthermore,the scheme does not achieve fast authentication and communication key negotiation phase between users.In order to solve these issues,this paper proposed a fast identity authentication scheme based on dynamic information,which uses decentralized authentication method and irregular dynamic authentication factors to achieve fast and continuous dynamic authentication between users and gateway.Moreover,the proposed scheme can achieve the secret key negotiation between users.The correctness and applicability of the protocol is proved by BAN logic formal analysis and AVISPA simulation experiment.Through security analysis,the scheme can achieve fast and continuous authentication,achieve all security requirements,and achieve communication key negotiation phase between mobile users.Therefore,the scheme is secure and reliable.Through rigorous security analysis,energy consumption and OPNET simulation experiment analysis results,the scheme can achieve all security and functional requirements with relatively small energy consumption,end-to-end delay,authentication delay and user key negotiation delay.Therefore,the protocol scheme is advanced.
Keywords/Search Tags:Authentication, Cryptography, Key agreement, Cyberspace security, Lightweight encryption
PDF Full Text Request
Related items