Skip to main content
Log in

Secure authenticated key exchange for WSNs in IoT applications

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) are the key technological building block of Internet of Things (IoT), by which remote users can access the real-time data from the sensor nodes. Due to the openness and mobility of such network, it is essential to establish secure links for end-to-end communication with proper authentication. Although amount of research works in this area have been made, so far designing a secure and efficient authenticated key exchange (AKE) protocol for this setting is still an open topic. So, the authors in this paper design a two-factor AKE protocol using elliptic curve cryptography (ECC) for WSNs in the context of IoT, allowing the end users and sensor nodes to exchange information directly after a secure link is established with the help of the corresponding gateway node. The heuristic security analysis has shown that the new protocol can provide various expected security attributes and resist various known attacks. Moreover, the performance study states that the new protocol is efficient enough and has certain efficiency advantages in the aspects of computation and communication costs compared with the same type of ECC-based AKE protocols for IoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5(99):3028–3043

    Article  Google Scholar 

  2. Chang CC, Wu HL, Sun CY (2016) Notes on secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 38

  3. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  4. Gutmann P (2002) PKI: it’s not dead, just resting. Computer 35(8):41–49

    Article  Google Scholar 

  5. Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak KS (2017) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708

    Article  Google Scholar 

  6. Kalra S, Sood SK (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 24:210–223

    Article  Google Scholar 

  7. Krawczyk H (2005) HMQV: a high-performance secure Diffie-Hellman protocol. Crypto 3621:546–566

    MathSciNet  MATH  Google Scholar 

  8. Kumari S, Wu F, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63(C):56–75

    Article  Google Scholar 

  9. Law L, Menezes A, Qu M, Solinas J, Vanstone S (2003) An efficient protocol for authenticated key agreement. Des Codes Cryptogr 28(2):119–134

    Article  MathSciNet  Google Scholar 

  10. Li CT, Weng CY, Lee CC (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13(8):9589–9603

    Article  Google Scholar 

  11. Miorandi D, Sicari S, Pellegrini FD, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497–1516

    Article  Google Scholar 

  12. Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32(2):17–31

    Article  Google Scholar 

  13. Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 2728–2733

  14. Roman R, Alcaraz C, Lopez J, Sklavos N (2011) Key management systems for sensor networks in the context of the internet of things. Comput Electr Eng 37(2):147–159

    Article  Google Scholar 

  15. Sadhukhan D, Ray S, Biswas GP, Khan MK, Dasgupta M (2020) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 1–38 (2020)

  16. Simplicio MA Jr, Silva MV, Alves RC, Shibata TK (2017) Lightweight and escrow-less authenticated key agreement for the internet of things. Comput Commun 98:43–51

    Article  Google Scholar 

  17. Ting P, Tsai J, Wu T (2018) Signcryption method suitable for low-power IoT devices in a wireless sensor network. IEEE Syst J 12(3):2385–2394

    Article  Google Scholar 

  18. Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20(2):96–112

    Article  Google Scholar 

  19. Wang KH, Chen CM, Fang W, Wu TY (2017) A secure authentication scheme for internet of things. Pervasive Mob Comput 42

  20. Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269–282

    Article  Google Scholar 

  21. Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11(1):17–27

    Article  Google Scholar 

  22. Xu L, Wu F (2019) A lightweight authentication scheme for multi-gateway wireless sensor networks under IoT conception. Arab J Sci Eng 44(4):3977–3993

    Article  Google Scholar 

  23. Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323

    Article  Google Scholar 

  24. Yang SK, Shiue YM, Su ZY, Liu IH, Liu CG (2020) An authentication information exchange scheme in WSN for IoT applications. IEEE Access 8:9728–9738

    Article  Google Scholar 

  25. Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to sincerely thank the anonymous reviewers for their valuable comments, and the editor for the patience and hard work for this paper. This work was supported in part by the Natural Science Basic Research Program of Shaanxi Province of China under Grant 2021JQ-123, and in part by the Fundamental Research Funds for the Central Universities under Grant 31020200QD011.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingping Qi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qi, M., Chen, J. Secure authenticated key exchange for WSNs in IoT applications. J Supercomput 77, 13897–13910 (2021). https://doi.org/10.1007/s11227-021-03836-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03836-y

Keywords

Navigation