Computer Science ›› 2019, Vol. 46 ›› Issue (9): 169-175.doi: 10.11896/j.issn.1002-137X.2019.09.024

• Information Security • Previous Articles     Next Articles

Bilateral Authentication Protocol for WSN and Certification by Strand Space Model

LIU Jing1,2, LAI Ying-xu1,2,3, YANG Sheng-zhi4, Lina XU5   

  1. (Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China)1;
    (Beijing Key Laboratory of Trusted Computing,Beijing 100124,China)2;
    (National Engineering Laboratory for Critical Technologies of Information Security Classified Protection,Beijing 100072,China)3;
    (Information Technology Support Center,Beijing University of Technology,Beijing 100124,China)4;
    (School of Computer Science,University College Dublin,Dublin 999014,Ireland)5
  • Received:2018-08-22 Online:2019-09-15 Published:2019-09-02

Abstract: With the development of industrial Internet,smart agriculture,smart home and other fields,wireless sensor networks (WSN) have been more widely used.However,its security issues have become prominent.Aiming at the problems of the vulnerability to failure as well as the limited capacity of energy and computational storage of sensor nodes in the wireless sensor networks (WSN),this paper constructed a two-way identity authentication protocol based on state information between base station and sensor nodes,which can ensure safety while meeting the requirements of lightweight and low cost of wireless sensor networks.First,the protocol authenticates the trusted situation of the platform based on the trusted network connection in the node access phase,verifies the trusted condition of the node and implements its encrypted registration.Then,during the operation phase,the transmission process of the important data is protected by the two-way authentication process of the data,and the status and reliability of the sensor nodes are confirmed by the timing update authentication.Meanwhile,the protocol allows the base station to periodically detect the running state information of the node,which is used for authentication to further enhance the protocol security,and to timely monitor the physical damage of the node.The proposed protocol reduces the communication process of the authentication process,while the introduced alarm message can enhance the troubleshooting capability,and the serial space model is used to formally analyze the protocol,proving the security of the protocol.Finally,the experimental results show that under a reasonable safety condition,the designed two-way identity authentication protocol has a good network scalability,and the increased delay time of sending data is within an acceptable range.The solution can enhance network access security and effectively defend against attacks from the inside node system,having good application value.

Key words: Alert mechanism, Authentication protocol, Strand space model, Wireless sensor networks

CLC Number: 

  • TP309
[1]QIAN Z H,WANG Y J.Internet of Things-oriented WirelessSensor Networks Review[J].Journal of Electronics & Information Technology,2013,35(1):215-227.(in Chinese)钱志鸿,王义君.面向物联网的无线传感器网络综述[J].电子与信息学报,2013,35(1):215-227.
[2]BOUBICHE D E,PATHAN A S K,LLORET J,et al.Advanced industrial wireless sensor networks and intelligent iot[J].IEEE Communications Magazine,2018,56(2):14-15.
[3]STOJKOSKA B L R,TRIVODALIEV K V.A review of Internet of Things for smart home:Challenges and solutions[J].Journal of Cleaner Production,2017,140:1454-1464.
[4]PAWAR M,AGARWAL J.A literature survey on security issues of WSN and different types of attacks in network[J].IndianJournal of Computer Science and Engineering,2017,8(2):80-83.
[5]BAUER K,LEE H.A distributed authentication scheme for a wireless sensing system [J].ACM Transactions on Information and System Security,2008,11(3):1-35.
[6]AXELM,DARTIESB,BARILJ L.Blockchain based trust & authentication for decentralized sensor networks[J].arXiv:1706.01730,2017.
[7]KANG B Y,WANG J Q,SHAO D Y,et al.A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks[J].Netinfo Security,2018,18(1):23-30.(in Chinese)亢保元,王佳强,邵栋阳,等.一种适用于异构Ad Hoc无线传感器网络的身份认证与密钥共识协议[J].信息网络安全,2018,18(1):23-30.
[8]TAI W L,CHANG Y F,LI W H.An IoT Notionbased Authent icat ion a nd Key Ag reement Scheme Ensur ingUser Anonymit y for Heterogeneous Ad Hoc Wireless Sensor Networks[J].Journal of Information Security and Applications,2017,34(2):133-141.
[9]HAMMI M T,LIVOLANT E,BELLOT P,et al.A lightweight mutual authentication protocol for the IoT[C]//Proceedings of International Conference on Mobile and Wireless Technology.Singapore:Springer,2017:3-12.
[10]HAMMI M T,LIVOLANT E,BELLOT P,et al.A lightweight IoT security protocol[C]//Proceedings of Cyber Security in Networking Conference (CSNet).Rio de Janeiro:IEEE Press,2017:1-8.
[11]WANG Y.Reserch on Secure Authentication Scheme For Re-souce-constrained Environments[D].Taiyuan:Taiyuan University of Technology,2016.(in Chinese)王颖.资源受限环境安全身份认证方案研究[D].太原:太原理工大学,2016.
[12]WANG C D,BAI Y,MO X L,et al.Identity of Two-way Authentication Mechanism Research Based on the Internet of Things[J].Acta Scientiarum Naturalium Universitatis Nankaiensis,2016,49(2):22-28.(in Chinese)王春东,白仪,莫秀良,等.基于物联网的身份双向认证机制研究[J].南开大学学报(自然科学版),2016,49(2):22-28.
[13]LIU T,XIONG Y,HUANG W C,et al.Node behavior and identity-based trusted authentication in wireless sensor networks[J].Journal of Computer Applications,2013,33(7):1842-1845,1857.(in Chinese)刘涛,熊焰,黄文超,等.无线传感器网络中基于节点行为和身份的可信认证[J].计算机应用,2013,33(7):1842-1845,1857.
[14]FOUCHAL H,BIESA J,ROMERO E,et al.A Security Scheme for Wireless Sensor Networks[C]//Proceedings of Global Communications Conference (GLOBECOM).Washington:IEEE Press,2016:1-5.
[15]YEIN A D,LIN C H,HSIEH W S.A secure mutual trustscheme for wireless sensor networks[C]//Proceedings of Industrial Electronics (ISIE),2017 IEEE 26th International Symposium.Edinburgh:IEEE Press,2017:1369-1375.
[16]刘静,刁子朋,庄俊玺,等.一种软件定义网络中安全的可信接入方法:中国,CN105933245A[P].2016-09-07.
[17]THAYER F J,HERZOG J C,GUTTMAN J D.Strand Spaces:Proving Security Protocols Correct[J].Journal of Computer Security,1999,7(2/3):191-230.
[18]XU F,GAO X C,HUANG H.Design and Correctness Proof of a Security Protocol for Mobile Computing[J].Compuer Science,2008,35(11):74-77.(in Chinese)许峰,高晓春,黄皓.基于Strand Space的移动计算安全协议设计与正确性证明[J].计算机科学,2008,35(11):74-77.
[19]LIU J,LAI Y X,DIAO Z P,et al.A trusted access method in software-defined network[J].Simulation Modelling Practice and Theory,2017,74(5):28-45.
[1] WANG Guo-wu, CHEN Yuan-yan. Improvement of DV-Hop Location Algorithm Based on Hop Correction and Genetic Simulated Annealing Algorithm [J]. Computer Science, 2021, 48(6A): 313-316.
[2] SU Fan-jun,DU Ke-yi. Trust Based Energy Efficient Opportunistic Routing Algorithm in Wireless Sensor Networks [J]. Computer Science, 2020, 47(2): 300-305.
[3] HOU Ming-xing,QI Hui,HUANG Bin-ke. Data Abnormality Processing in Wireless Sensor Networks Based on Distributed Compressed Sensing [J]. Computer Science, 2020, 47(1): 276-280.
[4] XIA Nu-nu, YANG Jin-ji, ZHAO Gan-sen, MO Xiao-shan. Formal Verification of Cloud-aided Lightweight Certificateless Authentication Protocol Based on Probabilistic Model [J]. Computer Science, 2019, 46(8): 206-211.
[5] LIANG Ping-yuan, LI Jie, PENG Jiao, WANG Hui. Research on 3D Dynamic Clustering Routing Algorithm Based on Cooperative MIMO for UWSN [J]. Computer Science, 2019, 46(6A): 336-342.
[6] LI Xiu-qin, WANG Tian-jing, BAI Guang-wei, SHEN Hang. Two-phase Multi-target Localization Algorithm Based on Compressed Sensing [J]. Computer Science, 2019, 46(5): 50-56.
[7] YANG Ying, YANG Wu-de, WU Hua-rui, MIAO Yi-sheng. Mobile Sink Based Data Collection Strategy for Farmland WSN [J]. Computer Science, 2019, 46(4): 106-111.
[8] WU Jian, SUN Bao-ming. Dictionary Refinement-based Localization Method Using Compressive Sensing inWireless Sensor Networks [J]. Computer Science, 2019, 46(4): 118-122.
[9] JIANG Rui, WU Qian, XU You-yun. 3D Node Localization Algorithm Based on Iterative Computation for Wireless Sensor Network [J]. Computer Science, 2019, 46(11): 65-71.
[10] LI Lu-lu, DONG Qing-kuan, CHEN Meng-meng. Cloud-based Lightweight RFID Group Tag Authentication Protocol [J]. Computer Science, 2019, 46(1): 182-189.
[11] YANG Si-xing, GUO Yan, LI Ning, SUN Bao-ming, QIAN Peng. Compressive Sensing Multi-target Localization Algorithm Based on Data Fusion [J]. Computer Science, 2018, 45(9): 161-165.
[12] CHI Kai-kai ,WEI Xin-chen, LIN Yi-min. High-throughput and Load-balanced Node Access Scheme for RF-energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2018, 45(8): 119-124.
[13] CHI Kai-kai, XU Xin-chen, WEI Xin-chen. Minimal Base Stations Deployment Scheme Satisfying Node Throughput Requirement in Radio Frequency Energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2018, 45(6A): 332-336.
[14] CHI Kai-kai, LIN Yi-min, LI Yan-jun, CHENG Zhen. Duty Cycle Scheme Maximizing Throughput in Energy Harvesting Sensor Networks [J]. Computer Science, 2018, 45(6): 100-104.
[15] SU Tao, GU Jing-jing and HUANG Tao-tao. Anchor Selection and Distributed Topology Preserving Maps in Wireless Sensor Networks [J]. Computer Science, 2018, 45(5): 54-58.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!