User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem

2017 
Authenticated querying is one of the prominent requirement of Internet of Things (IoT) or wireless networks of sensor devices to resist unauthorized users from accessing real time and confidential data. In this paper, we perform security analysis and find drawbacks of Das’s user authentication scheme (proposed in 2015). We propose an efficient authenticated key exchange mechanism using the concepts of the fuzzy extractor and Chinese Remainder Theorem. After that, we perform the security analysis of our scheme using widely accepted automated verification tools such as AVISPA and Scyther. Then, we perform logical verification using BAN Logic. Finally, we do the computational analysis, and we demonstrate the comparative analysis in respect of computational overhead and security features.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    27
    References
    1
    Citations
    NaN
    KQI
    []