Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks

IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS High-Confidence Computing Pub Date : 2023-11-24 DOI:10.1016/j.hcc.2023.100178
Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar
{"title":"Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks","authors":"Vincent Omollo Nyangaresi ,&nbsp;Ganesh Keshaorao Yenurkar","doi":"10.1016/j.hcc.2023.100178","DOIUrl":null,"url":null,"abstract":"<div><p>Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100178"},"PeriodicalIF":3.2000,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000764/pdfft?md5=d761183b678601441d00478ed3ce897b&pid=1-s2.0-S2667295223000764-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"High-Confidence Computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667295223000764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
资源有限的无线传感器网络的匿名保护轻量级认证协议
无线传感器网络已被部署在医疗保健、军事、交通和家庭自动化等领域,用于收集数据并转发给远程用户进行进一步处理。由于数据传输使用的是开放式无线通信信道,交换的信息很容易受到窃听和信息伪造等各种威胁。因此,许多安全解决方案被引入以应对这些挑战。然而,由于传感器节点的资源有限,部署传统安全方案的效率很低,因为传统安全方案需要较长的密钥才能提高安全性。因此,轻量级认证协议应运而生。遗憾的是,这些方案大多仍不安全,而其他方案则会产生相对较高的能源、计算、通信和存储复杂性。本文介绍了一种仅部署轻量级单向散列和排他性 OR 操作的协议。利用实或随机(ROR)模型对其进行的正式安全性分析表明,该协议有能力维护衍生会话密钥的安全性。此外,其语义安全性评估表明,它提供了用户隐私、匿名性、不可追踪性、身份验证、会话密钥协议和密钥保密性。此外,它还能抵御侧信道、物理捕获、窃听、离线猜测、欺骗、密码丢失、会话密钥泄露、伪造和假冒等攻击。在性能方面,它的通信开销相对较低,计算成本和支持的安全特性分别提高了 31.56% 和 33.33%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
4.70
自引率
0.00%
发文量
0
期刊最新文献
Erratum to “Exploring Personalized Internet of Things (PIoT), social connectivity, and Artificial Social Intelligence (ASI): A survey” [High-Confidence Computing 4 (2024) 100242] Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security Erratum to “An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in Robustness and Imperceptibility” [High-Confid. Comput. 3 (2023) 100153] A lightweight practical consensus mechanism for supply chain blockchain
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1