Font Size: a A A

Research On Anonymous Authentication And Key Agreement Scheme In WSN

Posted on:2020-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:Q L ZhangFull Text:PDF
GTID:2428330596481779Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Rapidly developing wireless sensor network technology has been widely used in various research fields,and the consequent network security and data security has become a primary obstacle to its development.Domestic and foreign scholars have proposed several security authentication schemes to solve the security flaws in the application of wireless sensor networks.However,these schemes can't completely resist wireless attacks due to their own security vulnerabilities and design defects.It is hard to ensure system participants communicate securely in an unreliable wireless environment.Therefore,how to design and build a novel safe authentication scheme to satisfy the identity security and data security of participants is an important issue in the current information security field.Focusing on ensuring user security and data security,this paper lucubrates an in-depth study on existing security authentication schemes in wireless sensor networks,then studies smart card-based two-way authentication schemes and anonymous multi-factor authentication schemes.The main work of this paper is summarized as follows:The security flaws of smart card based two-way authentication scheme proposed by Chang et al.is analyzed.It is pointed out that the scheme proposed by Chang et al.is vulnerable to offline password guessing attack,user-impersonation attack and session key compromise.The attacker can extract users' login request and authentication request to guess session key applied to the future communication,then destroy the reliability of the system,hence the scheme proposed by Chang et al.fails to satisfy user security and data security.What's more,the enhanced authentication scheme proposed by Jung et al.is studied.It is found that the scheme can't support forward security.The malicious attacker can compute the private key of the gateway node using the power analysis attack and side channel attack,then manufacture a session request by impersonating the sensor node or a legitimate user.Finally,the private parameters from its system and the privacy of the sensitive data are destroyed.The scheme proposed by Jung et al.also fails to ensure user security and data security.To address these security flaws in the two schemes,combining with the wireless sensor network application scenario framework,this paper presents a novel two-way authentication scheme using smart cards,which can resist various attacks such as offline password guessing attack,user impersonation attack,and man-in-the-middle attack.This paper compares the proposed scheme with related authentication schemes about security attributes and performance analysis.The results confirm that it is secure against the above security flaws and has lower computational overhead.To address the user anonymity in the wireless sensor networks,this paper presents a safe and efficient anonymous multi-factor authentication scheme based on cryptographic discrete logarithm problem and biometric algorithm,which can truly satisfy user anonymity and effectively resist impersonation attack,modification attack,tracking attack,etc.Furthermore,the scheme supports smart card revocation.Once users' smart cards are lost or stolen,users can apply for new smart cards through their own private information such as password and biometrics.Additionally,this paper compares the proposed scheme with related authentication schemes about security attributes and performance analysis.The results show that the proposed scheme has higher security,no significant increase in computational overhead and communication cost;meanwhile,the proposed scheme satisfies user security and data security in an unreliable environment,which is more suitable for providing security protection for resource-constrained wireless applications.
Keywords/Search Tags:Wireless Sensor Networks, Key Agreement, Two-way Authentication, Anonymity, BAN Logic
PDF Full Text Request
Related items