Secure Protocol for Resource-Constrained IoT Device Authentication

被引:1
|
作者
Nyangaresi, Vincent Omollo [1 ]
Rodrigues, Anthony Joachim [2 ]
Al Rababah, Ahmad A. [3 ]
机构
[1] Tom Mboya Univ Coll, Kisumu, Kenya
[2] Jaramogi Oginga Odinga Univ Sci & Technol, Bondo, Kenya
[3] King Abdulaziz Univ, Jeddah, Saudi Arabia
关键词
Attacks; Authentication; IoT; Privacy; Protocol; Security; Sessions; WSN; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; INTERNET; MANAGEMENT; PRIVACY;
D O I
10.4018/IJITN.302118
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and have been deployed in numerous fields such as battlefield surveillance. The exploitation of broadcasts in WSNs renders these networks susceptible to numerous attacks. Consequently, to boost security, reliability, and successful cooperation, trust must be established among the sensor nodes. Unfortunately, the current authentication and authorization approaches exhibit high key management overheads, depend on static digital signatures or trusted third parties, and have both high communication latencies and computational complexity that render them inefficient. In this paper, challenge-response mutual authentication protocol is proposed for enhancing security in WSN-based IoT environment. The simulation results showed that the proposed protocol has the least transaction costs, time complexity, end-to-end delays, and energy consumptions. It is also resilient against dictionary, side channel, cloning, man-in-the-middle (MitM), denial of service (DoS), and next password prediction attacks.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    [J]. SENSORS, 2020, 20 (13) : 1 - 18
  • [2] A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
    Madhusudhan, R.
    Shashidhara, R.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2993 - 3014
  • [3] A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
    R. Madhusudhan
    R. Shashidhara
    [J]. Arabian Journal for Science and Engineering, 2020, 45 : 2993 - 3014
  • [4] Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Scheme for Device-to-Server and Device-to-Device Communications
    Chau D M Pham
    Thao L P Nguyen
    Tran Khanh Dang
    [J]. FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 446 - 466
  • [5] A CRC-Based Authentication Model and ECC-Based Authentication Protocol for Resource-Constrained IoT Applications
    Keshta, Ismail
    [J]. IEEE Access, 2024, 12 : 156765 - 156784
  • [6] Cumulative Message Authentication Codes for Resource-Constrained IoT Networks
    Li, He
    Kumar, Vireshwar
    Park, Jung-Min
    Yang, Yaling
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15): : 11847 - 11859
  • [7] Secure and Low-Power Authentication for Resource-Constrained Devices
    Sethi, Mohit
    Kortoci, Pranvera
    Di Francesco, Mario
    Aura, Tuomas
    [J]. PROCEEDINGS 2015 5TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT), 2015, : 30 - 36
  • [8] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    [J]. IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [9] Secure End-to-End Key Establishment Protocol for Resource-Constrained Healthcare Sensors in the Context of IoT
    Iqbal, Muhammad A.
    Bayoumi, Magdy
    [J]. 2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 523 - 530
  • [10] Provable Secure Anonymous Device Authentication Protocol in IoT Environment
    Ren, Shanyao
    Liu, Yizhong
    Yu, Beiyuan
    Liu, Jianwei
    Li, Dongyu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12266 - 12277