Netinfo Security ›› 2018, Vol. 18 ›› Issue (1): 23-30.doi: 10.3969/j.issn.1671-1122.2018.01.004

• Orginal Article • Previous Articles     Next Articles

A Secure Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks

Baoyuan KANG, Jiaqiang WANG(), Dongyang SHAO, Chunqing LI   

  1. School of Computer Science and Software Engineering, Tianjin Polytechnic University, Tianjin 300387, China
  • Received:2017-11-18 Online:2018-01-20 Published:2020-05-11

Abstract:

With the use of wireless sensor networks becomes more and more wildly, it is very important to ensure the safety of data transmission between communication parties. So how to reach a session key has become a critical issue before encrypting the transmission data. And AKA protocol is used to solve this problem. After analysing TAI et al’s AKA protocol, we find that their protocol suffers from such a security flaw. When a user and a sensor node reach the session key, they cannot confirm identity of each other. So their AKA protocol cannot withstand impersonation attack. This paper shows the found security flaws and propose an improvement by changing the method of sensor node identity provides. And the sensor node can also get the user’s identity. So the authenticity of the communication parties will be verified. The proposed protocol can resist the impersonation attack effectively and the security is improved.

Key words: wireless sensor networks, identity authentication, key agreement, information security

CLC Number: