EN-LAKP: Lightweight Authentication and Key Agreement Protocol for Emerging Networks

被引:11
作者
Anand, Nemalikanti [1 ]
Saifulla, M. A. [1 ]
机构
[1] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad 500046, Telangana, India
关键词
Protocols; Wireless sensor networks; Security; Authentication; Cloning; Real-time systems; Computational modeling; Software defined networks; wireless sensor networks; authentication; security; key agreement; Scyther; WIRELESS SENSOR NETWORKS; PROVABLY SECURE; SCHEME; EXCHANGE; INTERNET;
D O I
10.1109/ACCESS.2023.3255646
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the next generation, emerging network technologies like Software Defined Networking (SDN) and Wireless Sensor Networks (WSNs) will be developed and deployed to improve computing facilities. Micro-electromechanical system (MEMS) technologies advance, and WSNs gain in popularity because they provide real-time monitoring solutions that are both economically and practically viable. The SDN paradigm is consequently being incorporated into WSN to prevent a performance bottleneck with traditional network architecture as network traffic and diverse sensor nodes increase. Because they interact through a public channel and the sensor nodes are spread throughout a hostile environment, the information transmitted among entities is subject to assault. The proposed protocol showed how centralized SDN controller nodes logically assumed the role of network management and control. Therefore, we present a Lightweight Authentication and Key Agreement Protocol (LAKP) for SDN-enabled WSNs to protect entity communication. Additionally, we demonstrate that the suggested system prevents known security flaws by conducting both informal and formal security studies using the Scyther tool and Burrows-Abadi-Needham (BAN) logic. Further, the performance study demonstrates that the suggested scheme performs better in computing and communication burdens than related protocols with 1.6% to 5.4% and 1.3% to 5.8%, respectively.
引用
收藏
页码:28645 / 28657
页数:13
相关论文
共 46 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]   Identification of Threats and Security Risk Assessments for Recursive Internet Architecture [J].
Asgari, Hamid ;
Haines, Sarah ;
Rysavy, Ondrej .
IEEE SYSTEMS JOURNAL, 2018, 12 (03) :2437-2448
[3]   EV-Auth: Lightweight Authentication Protocol Suite for Dynamic Charging System of Electric Vehicles With Seamless Handover [J].
Babu, Ponnuru Raveendra ;
Reddy, Alavalapati Goutham ;
Palaniswamy, Basker ;
Kommuri, Suneel Kumar .
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2022, 7 (03) :734-747
[4]   EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions [J].
Babu, Ponnuru Raveendra ;
Reddy, Alavalapati Goutham ;
Palaniswamy, Basker ;
Das, Ashok Kumar .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05) :3791-3807
[5]   A survey on security challenges and protocols of electric vehicle dynamic charging system [J].
Babu, Ponnuru Raveendra ;
Palaniswamy, Basker ;
Reddy, Alavalapati Goutham ;
Odelu, Vanga ;
Kim, Hyun Sung .
SECURITY AND PRIVACY, 2022, 5 (03)
[6]   Robust Authentication Protocol for Dynamic Charging System of Electric Vehicles [J].
Babu, Ponnuru Raveendra ;
Amin, Ruhul ;
Reddy, Alavalapati Goutham ;
Das, Ashok Kumar ;
Susilo, Willy ;
Park, YoungHo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) :11338-11351
[7]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752
[8]   Know Your Enemy: Compromising Adversaries in Protocol Analysis [J].
Basin, David ;
Cremers, Cas .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (02)
[9]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[10]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453