Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar
{"title":"资源有限的无线传感器网络的匿名保护轻量级认证协议","authors":"Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar","doi":"10.1016/j.hcc.2023.100178","DOIUrl":null,"url":null,"abstract":"<div><p>Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"4 2","pages":"Article 100178"},"PeriodicalIF":3.2000,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000764/pdfft?md5=d761183b678601441d00478ed3ce897b&pid=1-s2.0-S2667295223000764-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks\",\"authors\":\"Vincent Omollo Nyangaresi , Ganesh Keshaorao Yenurkar\",\"doi\":\"10.1016/j.hcc.2023.100178\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.</p></div>\",\"PeriodicalId\":100605,\"journal\":{\"name\":\"High-Confidence Computing\",\"volume\":\"4 2\",\"pages\":\"Article 100178\"},\"PeriodicalIF\":3.2000,\"publicationDate\":\"2023-11-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2667295223000764/pdfft?md5=d761183b678601441d00478ed3ce897b&pid=1-s2.0-S2667295223000764-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"High-Confidence Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2667295223000764\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"High-Confidence Computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667295223000764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
无线传感器网络已被部署在医疗保健、军事、交通和家庭自动化等领域,用于收集数据并转发给远程用户进行进一步处理。由于数据传输使用的是开放式无线通信信道,交换的信息很容易受到窃听和信息伪造等各种威胁。因此,许多安全解决方案被引入以应对这些挑战。然而,由于传感器节点的资源有限,部署传统安全方案的效率很低,因为传统安全方案需要较长的密钥才能提高安全性。因此,轻量级认证协议应运而生。遗憾的是,这些方案大多仍不安全,而其他方案则会产生相对较高的能源、计算、通信和存储复杂性。本文介绍了一种仅部署轻量级单向散列和排他性 OR 操作的协议。利用实或随机(ROR)模型对其进行的正式安全性分析表明,该协议有能力维护衍生会话密钥的安全性。此外,其语义安全性评估表明,它提供了用户隐私、匿名性、不可追踪性、身份验证、会话密钥协议和密钥保密性。此外,它还能抵御侧信道、物理捕获、窃听、离线猜测、欺骗、密码丢失、会话密钥泄露、伪造和假冒等攻击。在性能方面,它的通信开销相对较低,计算成本和支持的安全特性分别提高了 31.56% 和 33.33%。
Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks
Wireless sensor networks have been deployed in areas such as healthcare, military, transportation and home automation to collect data and forward it to remote users for further processing. Since open wireless communication channels are utilized for data transmissions, the exchanged messages are vulnerable to various threats such as eavesdropping and message falsifications. Therefore, many security solutions have been introduced to address these challenges. However, the resource-constrained nature of the sensor nodes makes it inefficient to deploy the conventional security schemes which require long keys for improved security. Therefore, lightweight authentication protocols have been presented. Unfortunately, majority of these schemes are still insecure while others incur relatively higher energy, computation, communication and storage complexities. In this paper, a protocol that deploys only lightweight one-way hashing and exclusive OR operations is presented. Its formal security analysis using Real-or Random (ROR) model demonstrates its capability to uphold the security of the derived session keys. In addition, its semantic security evaluation shows that it offers user privacy, anonymity, untraceability, authentication, session key agreement and key secrecy. Moreover, it is shown to resist attacks such as side-channeling, physical capture, eavesdropping, offline guessing, spoofing, password loss, session key disclosure, forgery and impersonations. In terms of performance, it has relatively lower communication overheads and improves the computation costs and supported security characteristics by 31.56% and 33.33% respectively.