Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks

被引:4
作者
Nyangaresi, Vincent Omollo [1 ]
Yenurkar, Ganesh Keshaorao [2 ]
机构
[1] Jaram Oginga Odinga Univ Sci & Technol, Bondo, Kenya
[2] Yeshwantrao Chavan Coll Engn, Wanadongri 441110, India
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 02期
关键词
Anonymity; Authentication; Formal security; Lightweight; Privacy; Sensor; WSN; EFFICIENT AUTHENTICATION; SCHEME;
D O I
10.1016/j.hcc.2023.100178
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real -or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:14
相关论文
共 55 条
  • [1] Wireless Sensor Networks in Agriculture: Insights from Bibliometric Analysis
    Abdollahi, Alireza
    Rejeb, Karim
    Rejeb, Abderahman
    Mostafa, Mohamed M.
    Zailani, Suhaiza
    [J]. SUSTAINABILITY, 2021, 13 (21)
  • [2] UAV Computing-Assisted Search and Rescue Mission Framework for Disaster and Harsh Environment Mitigation
    Alsamhi, Saeed Hamood
    Shvetsov, Alexey, V
    Kumar, Santosh
    Shvetsova, Svetlana, V
    Alhartomi, Mohammed A.
    Hawbani, Ammar
    Rajput, Navin Singh
    Srivastava, Sumit
    Saif, Abdu
    Nyangaresi, Vincent Omollo
    [J]. DRONES, 2022, 6 (07)
  • [3] A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 483 - 495
  • [4] Apsara MB, 2020, ENG TECHNOL APPL SCI, V10, P5108
  • [5] RETRACTED: An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN (Retracted Article)
    Arivarasi, A.
    Ramesh, P.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (Suppl 1) : 9 - 9
  • [6] Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks
    Awan, Saba
    Javaid, Nadeem
    Ullah, Sameeh
    Khan, Asad Ullah
    Qamar, Ali Mustafa
    Choi, Jin-Ghoo
    [J]. SENSORS, 2022, 22 (02)
  • [7] Internet of Things Security: Challenges and Key Issues
    Azrour, Mourade
    Mabrouki, Jamal
    Guezzaz, Azidine
    Kanwal, Ambrina
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] FAJIT: a fuzzy-based data aggregation technique for energy efficiency in wireless sensor network
    Bhushan, Shashi
    Kumar, Manoj
    Kumar, Pramod
    Stephan, Thompson
    Shankar, Achyut
    Liu, Peide
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (02) : 997 - 1007
  • [9] Cogent and Energy Efficient Authentication Protocol for WSN in IoT
    Butt, Tariq Mahmood
    Riaz, Rabia
    Chakraborty, Chinmay
    Rizvi, Sanam Shahla
    Paul, Anand
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 1877 - 1898
  • [10] A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks
    Chandrakar, Preeti
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2019, 10 (01) : 96 - 116