A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Citations Over TimeTop 10% of 2019 papers
Abstract
Public key cryptographic primitive (e.g., the famous Diffie-Hellman key agreement, or public key encryption) has recently been used as a standard building block in authenticated key agreement (AKA) constructions for wireless sensor networks (WSNs) to provide perfect forward secrecy (PFS), where the expensive cryptographic operation (i.e., exponentiation calculation) is involved. However, realizing such complex computation on resource-constrained wireless sensors is inefficient and even impossible on some devices. In this work, we introduce a new AKA scheme with PFS for WSNs without using any public key cryptographic primitive. To achieve PFS, we rely on a new dynamic one-time authentication credential that is regularly updated in each session. In particular, each value of the authentication credential is wisely associated with at most one session key that enables us to fulfill the security goal of PFS. Furthermore, the proposed scheme enables the principals to identify whether they have been impersonated previously. We highlight that our scheme can be very efficiently implemented on sensors since only hash function and XOR operation are required.
Related Papers
- → IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography(2019)13 cited
- → An efficient and secure one-round authenticated key agreement protocol without pairings(2011)4 cited
- → Authenticated Key Agreement Protocol for Wireless Sensor Networks(2015)2 cited
- Fast key agreement protocols for wireless networks based on bilinear pairings(2009)
- IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography.(2019)