Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks

Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar

High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (2) : 100178

PDF (981KB)
High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (2) : 100178 DOI: 10.1016/j.hcc.2023.100178
Research Articles
research-article

Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks

Author information +
History +
PDF (981KB)

Abstract

Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.

Keywords

Anonymity / Authentication / Formal security / Lightweight / Privacy / Sensor / WSN

Cite this article

Download citation ▾
Vincent Omollo Nyangaresi, Ganesh Keshaorao Yenurkar. Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks. High-Confidence Computing, 2024, 4(2): 100178 DOI:10.1016/j.hcc.2023.100178

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

[1]

M. Dener, A. Orman, BBAP-WSN: A new blockchain-based authentication protocol for wireless sensor networks, Appl. Sci. 13 (3) (2023) 1526.

[2]

J. Qiu, Z. Tian, C. Du, Q. Zuo, S. Su, B. Fang, A survey on access control in the age of internet of things, IEEE Internet Things J. 7 (6) (2020) 4682-4696.

[3]

A. Abdollahi, K. Rejeb, A. Rejeb, M.M. Mostafa, S. Zailani, Wireless sensor networks in agriculture: Insights from bibliometric analysis, Sustainability 13 (21) (2021) 12011.

[4]

P. Kumar, S. Bhushan, M. Kumar, M. Alazab, Secure key management and mutual authentication protocol for wireless sensor network by linking edge devices using hybrid approach, Wirel. Pers. Commun. (2023) 1-23.

[5]

J. Mo, Z. Hu, W. Shen, A provably secure three-factor authentication protocol based on chebyshev chaotic mapping for wireless sensor network, IEEE Access 10 (2022) 12137-12152.

[6]

V.O. Nyangaresi, Privacy preserving three-factor authentication protocol for secure message forwarding in Wireless Body Area networks, Ad Hoc Netw. 142 (2023) 103117.

[7]

M. Azrour, J. Mabrouki, A. Guezzaz, A. Kanwal, Internet of things security: challenges and key issues, Secur. Commun. Netw. 2021 (2021) 1-11.

[8]

A. Shahraki, A. Taherkordi, Ø. Haugen, F. Eliassen, A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms, IEEE Trans. Netw. Serv. Manag. 18 (2) (2020) 2242-2274.

[9]

E. Yuan, L. Wang, S. Cheng, N. Ao, Q. Guo, A key management scheme based on pairing-free identity based digital signature algorithm for heterogeneous wireless sensor networks, Sensors 20 (6) (2020) 1543.

[10]

A.K. Gautam, R. Kumar, A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks, SN Appl. Sci. 3 (1) (2021) 50.

[11]

Z. Ding, Q. Xie, Provably secure dynamic anonymous authentication protocol for wireless sensor networks in internet of things, Sustainability 15 (7) (2023) 5734.

[12]

Z. Xu, M. Cai, X. Li, T. Hu, Q. Song, Edge-aided reliable data transmission for heterogeneous edge-iot sensor networks, Sensors 19 (9) (2019) 2078.

[13]

S. Bhushan, M. Kumar, P. Kumar, T. Stephan, A. Shankar, P. Liu, FAJIT: a fuzzy-based data aggregation technique for energy efficiency in wireless sensor network, Complex Intell. Syst. 7 (2021) 997-1007.

[14]

V.O. Nyangaresi, Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography, J. Syst. Archit. 133 (2022) 102763.

[15]

S.A. Chaudhry, K. Yahya, S. Garg, G. Kaddoum, M.M. Hassan, Y.B. Zikria, LAS-SG: An elliptic curve-based lightweight authentication scheme for smart grid environments, IEEE Trans. Ind. Inform. 19 (2) (2022) 1504-1511.

[16]

A. Irshad, S.A. Chaudhry, M. Sher, B.A. Alzahrani, S. Kumari, X. Li, F. Wu, An anonymous and efficient multiserver authenticated key agreement with offline registration centre, IEEE Syst. J. 13 (1) (2018) 436-446.

[17]

M.F. Moghadam, M. Nikooghadam, M.A.B. Al Jabban, M. Alishahi, L. Mortazavi, A. Mohajerzadeh, An efficient authentication and key agreement scheme based on ECDH for wireless sensor network, IEEE Access 8 (2020) 73182-73192.

[18]

D.K. Kwon, S.J. Yu, J.Y. Lee, S.H. Son, Y.H. Park, WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks, Sensors 21 (3) (2021) 936.

[19]

S. Awan, N. Javaid, S. Ullah, A.U. Khan, A.M. Qamar, J.G. Choi, Blockchain based secure routing and trust management in wireless sensor networks, Sensors 22 (2) (2022) 411.

[20]

V.O. Nyangaresi, A formally validated authentication algorithm for secure message forwarding in smart home networks, SN Comput. Sci. 3 (5) (2022) 364.

[21]

P. Chandrakar, A secure remote user authentication protocol for healthcare monitoring using wireless medical sensor networks, Int. J. Ambient Comput. Intell. (IJACI) 10 (1) (2019) 96-116.

[22]

X. Liu, Z. Guo, J. Ma, Y. Song, A secure authentication scheme for wireless sensor networks based on DAC and Intel SGX, IEEE Internet Things J. 9 (5) (2021) 3533-3547.

[23]

R. Amin, S.H. Islam, G.P. Biswas, M.K. Khan, N. Kumar, A robust and anonymous patient monitoring system using wireless medical sensor networks, Future Gener. Comput. Syst. 80 (2018) 483-495.

[24]

X. Li, J. Peng, M.S. Obaidat, F. Wu, M.K. Khan, C. Chen, A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems, IEEE Syst. J. 14 (1) (2019) 39-50.

[25]

C.T. Chen, C.C. Lee, I.C. Lin, Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments, Plos one 15 (4) (2020) e0232277.

[26]

B. Hu, W. Tang, Q. Xie, A two-factor security authentication scheme for wireless sensor networks in IoT environments, Neurocomputing 500 (2022) 741-749.

[27]

U. Gulen, S. Baktir, Elliptic curve cryptography for wireless sensor networks using the number theoretic transform, Sensors 20 (5) (2020) 1507.

[28]

A.B. Feroz Khan, G. Anandharaj, A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT, Wirel. Pers. Commun. 119 (4) (2021) 3149-3159.

[29]

V.O. Nyangaresi, M. Ahmad, A. Alkhayyat, W. Feng, Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things, Expert Syst. 39 (10) (2022) e13126.

[30]

M.H. Dahshan, Robust data authentication for unattended wireless sensor networks, Telecommun. Syst. 66 (2) (2017) 181-196.

[31]

F. Wu, L. Xu, S. Kumari, X. Li, An improved and provably secure three-factor user authentication scheme for wireless sensor networks, Peer-to-Peer Netw. Appl. 11 (2018) 1-20.

[32]

M.B. Apsara, P. Dayananda, C.N. Sowmyarani, A review on secure group key management schemes for data gathering in wireless sensor networks, Eng. Technol. Appl. Sci. Res 10 (1) (2020) 5108-5112.

[33]

S. Gupta, S. Gupta, D. Goyal, Comparison of Q-coverage P-connectivity sensor node scheduling heuristic between battery powered WSN & energy harvesting WSN, Int. J. Sens. Wirel. Commun. Control 11 (5) (2021) 553-559.

[34]

T.M. Butt, R. Riaz, C. Chakraborty, S.S. Rizvi, A. Paul, Cogent and energy efficient authentication protocol for wsn in iot, Comput. Mater. Contin. 68 (2021) 1877-1898.

[35]

C.H. Liu, Y.F. Chung, Secure user authentication scheme for wireless healthcare sensor networks, Comput. Electr. Eng. 59 (2017) 250-261.

[36]

V.O. Nyangaresi, M. Abd-Elnaby, M.M. Eid, A. Nabih Zaki Rashed, Trusted authority based session key agreement and authentication algorithm for smart grid networks, Trans. Emerg. Telecommun. Technol. 33 (9) (2022) e4528.

[37]

Y. Lu, G. Xu, L. Li, Y. Yang, Anonymous three-factor authenticated key agreement for wireless sensor networks, Wirel. Netw. 25 (2019) 1461-1475.

[38]

J. Mo, H. Chen, A lightweight secure user authentication and key agreement protocol for wireless sensor networks, Secur. Commun. Netw. 2019 (2019) 1-17.

[39]

S. Yu, Y. Park, SLUA-WSN: Secure and lightweight three-factor-based user authentication protocol for wireless sensor networks, sensors 20 (15) (2020) 4143.

[40]

M. Shuai, N. Yu, H. Wang, L. Xiong, Y. Li, A lightweight three-factor Anonymous authentication scheme with privacy protection for personalized healthcare applications, J. Organ. End User Comput. ( JOEUC) 33 (3) (2021) 1-18.

[41]

Q. Xie, Z. Ding, B. Hu, A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things, Secur. Commun. Netw. 2021 (2021) 1-12.

[42]

T.Y. Wu, L. Yang, Z. Lee, S.C. Chu, S. Kumari, S. Kumar, A provably secure three-factor authentication protocol for wireless sensor networks, Wirel. Commun. Mob. Comput. 2021 (2021) 1-15.

[43]

D. Kumar, A secure and efficient user authentication protocol for wireless sensor network, Multimedia Tools Appl. 80 (18) (2021) 27131-27154.

[44]

A. Arivarasi, P. Ramesh, An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN, J. Ambient Intell. Humaniz. Comput. (2021) 1-13.

[45]

V.O. Nyangaresi, Terminal independent security token derivation scheme for ultra-dense IoT networks, Array 15 (2022) 100210.

[46]

S. Shin, T. Kwon, A lightweight three-factor authentication and key agreement scheme in wireless sensor networks for smart homes, Sensors 19 (9) (2019) 2012.

[47]

D. Rangwani, D. Sadhukhan, S. Ray, M.K. Khan, M. Dasgupta, A robust provable-secure privacy-preserving authentication protocol for industrial internet of things, Peer-to-peer Netw. Appl. 14 (2021) 1548-1571.

[48]

A. Jabbari, J.B. Mohasefi, Improvement of a user authentication scheme for wireless sensor networks based on internet of things security, Wirel. Pers. Commun. 116 (3) (2021) 2565-2591.

[49]

Q. Jiang, S. Zeadally, J. Ma, D. He, Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks, Ieee Access 5 (2017) 3376-3392.

[50]

S.H. Alsamhi, A.V. Shvetsov, S. Kumar, S.V. Shvetsova, M.A. Alhartomi, A. Hawbani, et al., UAV computing-assisted search and rescue mission framework for disaster and harsh environment mitigation, Drones 6 (7) (2022) 154.

[51]

F. Wang, G. Xu, G. Xu, A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map, IEEE Access 7 (2019) 101596-101608.

[52]

G. Xu, F. Wang, M. Zhang, J. Peng, Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks, IEEE Access 8 (2020) 47282-47294.

[53]

M.A. Ferrag, L.A. Maglaras, H. Janicke, J. Jiang, L. Shu, Authentication protocols for internet of things: a comprehensive survey, Secur. Commun. Netw. (2017).

[54]

T. Salman, M. Zolanvari, A. Erbad, R. Jain, M. Samaka, Security services using blockchains: A state of the art survey, IEEE Commun. Surv. Tutor. 21 (1) (2018) 858-880.

[55]

A. Reyna, C. Martín, J. Chen, E. Soler, M. Díaz, On blockchain and its integration with IoT. Challenges and opportunities, Future Gener. Comput. Syst. 88 (2018) 173-190.

AI Summary AI Mindmap
PDF (981KB)

221

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/