An efficient three‐factor user authentication scheme for industrial wireless sensor network with fog computing

Author(s):  
Shreeya Swagatika Sahoo ◽  
Sujata Mohanty ◽  
Banshidhar Majhi
Author(s):  
Jihyeon Ryu ◽  
Hakjun Lee ◽  
Hyoungshick Kim ◽  
Dongho Won

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.'s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.'s scheme in detail. We also propose a new scheme by fixing such vulnerabilities and improving the performance of the protocol.


2021 ◽  
Author(s):  
M. Zulfiker Ali

The primary requirements of a secure Wireless Sensor Network architecture are confidentiality, integrity and authentication of users and other participating entities. User Authentication for wireless sensor networks is a fundamental and important issue in designing dependable and secure systems. In this thesis, we have outlined the security model, functional requirements, assumptions and network setup for an authentication scheme in the first phase. Keeping in mind the security requirements as well as the flaws of past authentication schemes, we propose a robust user authentication method that inherits user anonymity, mutual authentication and password changing functionality of previous password-based schemes and improves security by resisting gateway bypass and replay attack, and many logged in user with the same ID threat. Our scheme is a variant of strong password based schemes that does not require strict network synchronization. In the second phase of the thesis, we have analysed our authentication scheme from the perspective of security issues and functional requirements. The proposed scheme is modelled in SystemC. It is evaluated in different attack scenarios. The authentication latency, memory and functional requirements, and computational overhead are the metrics used to evaluate the scheme. The effect of multiple users on authentication latency in our scheme is also studied. Some of the past representative schemes have also been modelled and evaluated in the same environment. A detailed comparison of over-head cost, authentication latency and security features are provided in this thesis. It is verified and confirmed by modeling that our scheme provides enhanced security without adding extra computation at the sensor node.


Sign in / Sign up

Export Citation Format

Share Document