TY - JOUR
T1 - Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps
AU - Li, Ji Liang
AU - Zhang, Wei Guo
AU - Kumari, Saru
AU - Choo, Kim Kwang Raymond
AU - Hogrefe, Dieter
N1 - Publisher Copyright:
Copyright © 2018 John Wiley & Sons, Ltd.
PY - 2018/6
Y1 - 2018/6
N2 - A characteristic of wireless sensor networks (WSNs) different from traditional networks is that WSNs are vulnerable to various types of attacks because of their distinctive features, involving distributed and nomadic attribute, wireless transmission medium, and lack of centralized infrastructure of security protection. Recently, Kumari et al presented a mutual authentication and key agreement scheme for WSNs using chaotic maps. Unfortunately, we find that the scheme of Kumari et al cannot resist sensor node capture attack, session-specific temporary information attack, sensor node impersonation attack, and man-in-the-middle attack. To overcome the security weaknesses in the solution of Kumari et al, this paper introduces a secure and efficient mutual authentication and key agreement scheme for heterogeneous ad hoc WSNs in fully public channel. Consequently, compared with the solution of Kumari et al, while providing relatively higher level of security and more security features, the proposed solution remains a favorable performance on communication overhead, computation overhead, and storage overhead separately.
AB - A characteristic of wireless sensor networks (WSNs) different from traditional networks is that WSNs are vulnerable to various types of attacks because of their distinctive features, involving distributed and nomadic attribute, wireless transmission medium, and lack of centralized infrastructure of security protection. Recently, Kumari et al presented a mutual authentication and key agreement scheme for WSNs using chaotic maps. Unfortunately, we find that the scheme of Kumari et al cannot resist sensor node capture attack, session-specific temporary information attack, sensor node impersonation attack, and man-in-the-middle attack. To overcome the security weaknesses in the solution of Kumari et al, this paper introduces a secure and efficient mutual authentication and key agreement scheme for heterogeneous ad hoc WSNs in fully public channel. Consequently, compared with the solution of Kumari et al, while providing relatively higher level of security and more security features, the proposed solution remains a favorable performance on communication overhead, computation overhead, and storage overhead separately.
UR - https://www.scopus.com/pages/publications/85042554638
U2 - 10.1002/ett.3295
DO - 10.1002/ett.3295
M3 - 文章
AN - SCOPUS:85042554638
SN - 2161-5748
VL - 29
JO - Transactions on Emerging Telecommunications Technologies
JF - Transactions on Emerging Telecommunications Technologies
IS - 6
M1 - e3295
ER -