A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things
Wireless sensor networks (WSNs) have played an important role in the Internet of Things (IoT), and the 5G network is being considered as a major candidate for IoT's communication network with the advent of 5G commercialization. The potential of integrating WSNs and 5G in the IoT is expected to...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9057455/ |
id |
doaj-66b2648916774d779aaee35ea4296cb4 |
---|---|
record_format |
Article |
spelling |
doaj-66b2648916774d779aaee35ea4296cb42021-03-30T03:16:39ZengIEEEIEEE Access2169-35362020-01-018675556757110.1109/ACCESS.2020.29857199057455A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of ThingsSooyeon Shin0Taekyoung Kwon1https://orcid.org/0000-0002-5513-0836Graduate School of Information, Yonsei University, Seoul, South KoreaGraduate School of Information, Yonsei University, Seoul, South KoreaWireless sensor networks (WSNs) have played an important role in the Internet of Things (IoT), and the 5G network is being considered as a major candidate for IoT's communication network with the advent of 5G commercialization. The potential of integrating WSNs and 5G in the IoT is expected to allow IoT to penetrate deeply into our daily lives and to provide various services that are convenient, but at the same time, it also brings new security threats. From this aspect, user authentication and key agreement are essential for secure end-to-end communication. As IoT devices, including sensors, collect and process more and more personal information, both anonymous authentication and authorization are also required to protect the privacy and to prevent anyone without privileges from accessing private data. Recently, Adavoudi-Jolfaei et al. proposed an anonymous three-factor authentication and access control scheme for real-time applications in WSNs. However, we found that this scheme does not provide sensor-node anonymity and suffers from user collusion and desynchronization attacks. In this paper, we introduce a system architecture by considering the integration of WSNs and 5G for IoT. Based on a cryptanalysis of Adavoudi-Jolfaei et al.'s scheme and the system architecture, we propose an elliptic curve cryptography (ECC)-based privacy-preserving authentication, authorization, and key agreement scheme for WSNs in 5G-integrated IoT. We conduct a formal and informal security analysis in order to demonstrate that the proposed scheme withstands various security attacks and guarantees all desired security features, overcoming the drawbacks of Adavoudi-Jolfaei et al.'s scheme. Finally, a performance and comparative analysis with the related schemes indicate that the proposed scheme is both efficient and more secure.https://ieeexplore.ieee.org/document/9057455/Three-factor authenticationauthorizationkey agreementelliptic curve cryptographyanonymityuntraceability |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sooyeon Shin Taekyoung Kwon |
spellingShingle |
Sooyeon Shin Taekyoung Kwon A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things IEEE Access Three-factor authentication authorization key agreement elliptic curve cryptography anonymity untraceability |
author_facet |
Sooyeon Shin Taekyoung Kwon |
author_sort |
Sooyeon Shin |
title |
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things |
title_short |
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things |
title_full |
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things |
title_fullStr |
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things |
title_full_unstemmed |
A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things |
title_sort |
privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5g-integrated internet of things |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
Wireless sensor networks (WSNs) have played an important role in the Internet of Things (IoT), and the 5G network is being considered as a major candidate for IoT's communication network with the advent of 5G commercialization. The potential of integrating WSNs and 5G in the IoT is expected to allow IoT to penetrate deeply into our daily lives and to provide various services that are convenient, but at the same time, it also brings new security threats. From this aspect, user authentication and key agreement are essential for secure end-to-end communication. As IoT devices, including sensors, collect and process more and more personal information, both anonymous authentication and authorization are also required to protect the privacy and to prevent anyone without privileges from accessing private data. Recently, Adavoudi-Jolfaei et al. proposed an anonymous three-factor authentication and access control scheme for real-time applications in WSNs. However, we found that this scheme does not provide sensor-node anonymity and suffers from user collusion and desynchronization attacks. In this paper, we introduce a system architecture by considering the integration of WSNs and 5G for IoT. Based on a cryptanalysis of Adavoudi-Jolfaei et al.'s scheme and the system architecture, we propose an elliptic curve cryptography (ECC)-based privacy-preserving authentication, authorization, and key agreement scheme for WSNs in 5G-integrated IoT. We conduct a formal and informal security analysis in order to demonstrate that the proposed scheme withstands various security attacks and guarantees all desired security features, overcoming the drawbacks of Adavoudi-Jolfaei et al.'s scheme. Finally, a performance and comparative analysis with the related schemes indicate that the proposed scheme is both efficient and more secure. |
topic |
Three-factor authentication authorization key agreement elliptic curve cryptography anonymity untraceability |
url |
https://ieeexplore.ieee.org/document/9057455/ |
work_keys_str_mv |
AT sooyeonshin aprivacypreservingauthenticationauthorizationandkeyagreementschemeforwirelesssensornetworksin5gintegratedinternetofthings AT taekyoungkwon aprivacypreservingauthenticationauthorizationandkeyagreementschemeforwirelesssensornetworksin5gintegratedinternetofthings AT sooyeonshin privacypreservingauthenticationauthorizationandkeyagreementschemeforwirelesssensornetworksin5gintegratedinternetofthings AT taekyoungkwon privacypreservingauthenticationauthorizationandkeyagreementschemeforwirelesssensornetworksin5gintegratedinternetofthings |
_version_ |
1724183755434754048 |