Ling Xiong, N. Xiong, Changyuan Wang, Xinqiao Yu, Mengxia Shuai
{"title":"An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks","authors":"Ling Xiong, N. Xiong, Changyuan Wang, Xinqiao Yu, Mengxia Shuai","doi":"10.1109/TSMC.2019.2957175","DOIUrl":null,"url":null,"abstract":"Until now, the pseudonym ID and one-time hash chain as the key technologies solve anonymous and forward secrecy properties, respectively, in lightweight authentication protocols for wireless sensor networks (WSNs) environment. However, both techniques have to face the limitation of asynchronization attack, which will cause the pseudonym ID and one-time hash chain value between participants to be loss of synchronization when the transmitted message is blocked. Most recently, a serial of lightweight anonymous authentication scheme with forward secrecy (LAASFS) have been built to resolve this problem. Unfortunately, they failed to handle this question satisfactorily. Besides, most of them are still vulnerable to smart card loss attack (SCLA). In this article, to address these issues and make more effective, we combine pseudonym ID, one-time hash chain and tag techniques to construct an LAASFS for WSNs environment. The proposed LAASFS can be adaptive resilience of asynchronization attacks. In addition, it is also able to resist a variety of known attacks like SCLA and wrong password login attack. Formal analyses are taken by BAN logic and ProVerif tool to demonstrate the security of properties of our LAASFS. Compared with several previous related schemes, the proposed LAASFS possesses obvious advantages in computation and communication costs.","PeriodicalId":55007,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part A-Systems and Humans","volume":"9 1","pages":"5626-5638"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Systems Man and Cybernetics Part A-Systems and Humans","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSMC.2019.2957175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Until now, the pseudonym ID and one-time hash chain as the key technologies solve anonymous and forward secrecy properties, respectively, in lightweight authentication protocols for wireless sensor networks (WSNs) environment. However, both techniques have to face the limitation of asynchronization attack, which will cause the pseudonym ID and one-time hash chain value between participants to be loss of synchronization when the transmitted message is blocked. Most recently, a serial of lightweight anonymous authentication scheme with forward secrecy (LAASFS) have been built to resolve this problem. Unfortunately, they failed to handle this question satisfactorily. Besides, most of them are still vulnerable to smart card loss attack (SCLA). In this article, to address these issues and make more effective, we combine pseudonym ID, one-time hash chain and tag techniques to construct an LAASFS for WSNs environment. The proposed LAASFS can be adaptive resilience of asynchronization attacks. In addition, it is also able to resist a variety of known attacks like SCLA and wrong password login attack. Formal analyses are taken by BAN logic and ProVerif tool to demonstrate the security of properties of our LAASFS. Compared with several previous related schemes, the proposed LAASFS possesses obvious advantages in computation and communication costs.
期刊介绍:
The scope of the IEEE Transactions on Systems, Man, and Cybernetics: Systems includes the fields of systems engineering. It includes issue formulation, analysis and modeling, decision making, and issue interpretation for any of the systems engineering lifecycle phases associated with the definition, development, and deployment of large systems. In addition, it includes systems management, systems engineering processes, and a variety of systems engineering methods such as optimization, modeling and simulation.