• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Liu, Jing (Liu, Jing.) | Liu, Lihui (Liu, Lihui.) | Liu, Zenghui (Liu, Zenghui.) | Lai, Yingxu (Lai, Yingxu.) (Scholars:赖英旭) | Qin, Hua (Qin, Hua.) | Luo, Shiyao (Luo, Shiyao.)

Indexed by:

EI Scopus SCIE

Abstract:

Although wireless sensor networks (WSNs) are widely used in many fields, such as industrial production, medical studies, and environmental monitoring, they are vulnerable to various security problems. This study proposes a WSN node access authentication protocol based on trusted connection architecture to prevent easy node capture and various malicious attacks as well as to address the limited energy and computing power and different levels of node credibility in WSNs. First, each node of a WSN is configured using a trusted platform module to ensure complete key generation and safe storage, and thus provides security for the access protocol. Second, an alarm mechanism is introduced to avoid cluster node issues, such as not forwarding data, forwarding part of the data, and forwarding wrong data. This mechanism enhances the troubleshooting capability. Finally, during node access, bidirectional node identity authentication, platform identity authentication, and platform integrity verification are performed to achieve trusted node access. Our protocol is formally verified using Syverson-Van Oorschot (SVO) logic. The security features are applied to analyze the protocol, and back-end analysis modules such as On-the-fly Model-Checker (OFMC) and Constraint Logic based Attack Searcher (CL-AtSe) of the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool are used to test the protocol. The theoretical analysis and test results show that the established security target of the protocol can resist network attacks in real application scenarios. In addition, the implementation efficiency of the protocol is sufficiently analyzed and evaluated. The results show that the protocol has high execution efficiency. In particular, the protocol is suitable for WSNs with high security requirements and limited computing power.

Keyword:

Authentication protocol Wireless sensor networks Trusted connection architecture Syverson-Van Oorschot (SVO) Automated Validation of Internet Security Protocols and Applications (AVISPA)

Author Community:

  • [ 1 ] [Liu, Jing]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 2 ] [Liu, Lihui]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 3 ] [Lai, Yingxu]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 4 ] [Qin, Hua]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 5 ] [Luo, Shiyao]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 6 ] [Liu, Jing]Minist Educ, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 7 ] [Lai, Yingxu]Minist Educ, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 8 ] [Qin, Hua]Minist Educ, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
  • [ 9 ] [Liu, Zenghui]Beijing Polytech, Inst Electromech Engn, Beijing 100176, Peoples R China

Reprint Author's Address:

Show more details

Related Keywords:

Related Article:

Source :

SIMULATION MODELLING PRACTICE AND THEORY

ISSN: 1569-190X

Year: 2022

Volume: 117

4 . 2

JCR@2022

4 . 2 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:46

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count: 9

SCOPUS Cited Count: 13

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 11

Affiliated Colleges:

Online/Total:1024/10619556
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.