Font Size: a A A

Research On Anonymous Authentication Protocol In Wireless Sensor Networks

Posted on:2022-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:K H LiFull Text:PDF
GTID:2518306743483274Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks play an important role in smart cities,and users can access sensors to obtain data to process various affairs at any time.Therefore,privacy and security are very important in wireless sensor networks.Anonymous authentication and session key agreement protocols are important methods to solve the problem.This paper analyzes the anonymous authentication protocol of the wireless sensor network and its two applications,points out the security problems of the relevant protocols and designs three new protocols to realize the security and privacy protection in wireless sensing networks.First of all,this paper analyzes the anonymous authentication protocol of wireless sensor networks.We point out that Luo et al.'s protocol cannot resist sensor capture attack and verification table modification attack and also does not achieve perfect forward security and session key security.Based on the network model and threat model of the Luo et al.protocol,this paper proposes a new protocol that overcomes the flaws of their protocol.Through Pro Verif formal security analysis and informal security analysis,the new protocol can resist various known attacks.The results of comparison with the performance of related protocols show that the improved protocol has higher efficiency.Secondly,we analyze the security of wireless sensor network in smart city.Focusing on the anonymous authentication protocol of Banerjee et al.,we find that their protocol does not achieve identity unlinkability,perfect forward security,and session key secrecy,and also can't resist offline password guessing attack and impersonation sensor attack.And then gives specific details of the attack method.Then,we design an anonymous authentication protocol based on a three-factor and elliptic curve and then analyze it through informal security analysis and formal verification tool Pro Verif.The results show that the proposed protocol has better security.Compared with the efficiency with related protocols,the proposed protocol has higher efficiency.Finally,this paper analyzes the security of wireless sensor network applications in smart medical systems.Focusing on the anonymous authentication protocol of Deebak et al.,the sensor capture attack is found and the specific details of the attack method are given.Based on the network model of Deebak et al.,this paper uses a two-factor and elliptic curve to design a more efficient and safer anonymous authentication protocol.The result of formal security analysis Pro Verif shows that it can resist multiple attacks and realize the anonymity of users and sensors.The results of informal security analysis show that it can resist various known attacks.Compared with the related protocols in terms of efficiency,the proposed protocol has higher efficiency.
Keywords/Search Tags:Wireless sensor network, Anonymous authentication protocol, Session key agreement, Three-factor authentication, Two-factor authentication
PDF Full Text Request
Related items