Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters

被引:23
作者
Maurya, Anup Kumar [1 ]
Das, Ashok Kumar [2 ]
Jamal, Sajjad Shaukat [3 ]
Giri, Debasis [4 ]
机构
[1] Goa Inst Management, Sattari 403505, Goa, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
[4] Maulana Abul Kalam Azad Univ Technol, Nadia 741249, W Bengal, India
关键词
Wireless Sensor Networks (WSNs); Internet of Things (IoT); Bloom filter; Fuzzy extractor; User authentication; Security; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; INTERNET; PROTOCOL; ANONYMITY; EXCHANGE;
D O I
10.1016/j.sysarc.2021.102296
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose an efficient Bloom filter and fuzzy extractor based user authentication technique, which is significant for an Internet of Things (IoT)-enabled multi-hop Wireless Sensor Networks (IoT-WSNs). The novelty of the proposed authentication technique is that it prevents fraudulent querying data delivery at the starting phase (i.e., at the querying sensor node itself) to stop false or counterfeit data flooding (which can exhaust the resources of IoT-WSNs) from the resource-constrained IoT-enabled sensor nodes to the nearby gateway node. The proposed authentication technique has the ability to significantly reduce the Bloom filter based false positive for user authentication in IoT-WSNs, while also preserving the constraint resources of WSNs. To estimate the security robustness of the proposed protocol based on the security goals of IoT-WSNs, we perform the formal security analysis using the random oracle and Real-Or-Random (ROR) models, informal security analysis and also the formal security verification using a widely-recognized automated software validation tool, known as Automated Validation of Internet Security Protocols and Applications (AVISPA). Next, communication and computational overheads analysis reveal that the proposed protocol is appropriate for resource-constrained sensor nodes. Furthermore, a correlative security feature and complexity analysis outcomes validate that the proposed protocol is reliable, secure, and efficient in comparison with other existing state of art related user authentication protocols.
引用
收藏
页数:19
相关论文
共 90 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[3]   RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications [J].
Al-Zubaidie, Mishall ;
Zhang, Zhongwei ;
Zhang, Ji .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[4]   An Efficient Biometric Authentication Protocol for Wireless Sensor Networks [J].
Althobaiti, Ohood ;
Al-Rodhaan, Mznah ;
Al-Dhelaan, Abdullah .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[5]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[6]  
[Anonymous], 2019, TINYOS OPEN SOURCE O
[7]  
[Anonymous], 2004, PERFORMANCE COMP ELL
[8]  
AVISPA, 2021, AUT VAL INT SEC PROT
[9]  
AVISPA, 2021, SPAN SEC PROT AN AVI
[10]  
Bellare M., 1993, 1 ACM C COMP COMM SE, P62