scholarly journals A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Qi Xie ◽  
Zixuan Ding ◽  
Bin Hu

The Internet of things is playing more and more important role in smart healthcare, smart grids, and smart transportation, and using wireless sensor network (WSN), we can easily obtain and transmit information. However, the data security and users’ privacy are the biggest challenges for WSN because sensor nodes have low computing power and low storage capacity and are easy to be captured, and wireless networks are vulnerable. In 2021, Shuai et al. proposed a lightweight three-factor anonymous authentication scheme for WSN. However, we found that their protocol is vulnerable to stolen-verifier attack, modification of messages’ attack, and no perfect forward secrecy. Then, a new three-factor anonymous authentication scheme using elliptic curve cryptography (ECC) is proposed. Through informal and formal security analyses, our scheme can resist various known attacks and maintains low computational complexity.

2018 ◽  
Vol 7 (2.26) ◽  
pp. 119 ◽  
Author(s):  
M Durairaj ◽  
K Muthuramalingam

Internet of Things (IoT) consists of a large number of connected objects that are communicating with each other. To support trusted communication between IoT objects, the authentication procedures should be used and applied to the communicating entities. Internet of Things (IoT) is an emerging technology, which makes the remote sensing and control across the heterogeneous network a reality, and has good prospects in industrial applications. As an essential infrastructure, Wireless Sensor Networks (WSNs) play a crucial role in industrial IoT. Due to the resource-constrained feature of sensor nodes, the design of security and efficiency balanced authentication scheme for WSNs becomes a significant challenge in IoT applications. In this paper, an anonymous authentication scheme for WSNs in an Internet of Things environments.  


2020 ◽  
Vol 14 ◽  
Author(s):  
Intyaz Alam ◽  
Sushil Kumar ◽  
Pankaj Kumar Kashyap

Background: Recently, Internet of Things (IoT) has brought various changes in the existing research field by including new areas such as smart transportation, smart home facilities, smart healthcare, etc. In smart transportation systems, vehicles contain different components to access information related to passengers, drivers, vehicle speed, and many more. This information can be accessed by connecting vehicles with Internet of Things leading to new fields of research known as Internet of Vehicles. The setup of Internet of Vehicle (IoV) consists of many sensors to establish a connection with several other sensors belonging to different environments by exploiting different technologies. The communication of the sensors faces a lot of challenging issues. Some of the critical challenges are to maintain security in information exchanges among the vehicles, inequality in sensors, quality of internet connection, and storage capacity. Objective: To overcome the challenging issues, we have designed a new framework consisting of seven-layered architecture, including the security layered, which provides seamless integration by communicating the devices present in the IoV environment. Further, a network model consisting of four components such as Cloud, Fog, Connection, and Clients has been designed. Finally, the protocol stack which describes the protocol used in each layer of the proposed seven-layered IoV architecture has been shown. Methods: In this proposed architecture, the representation and the functionalities of each layer and types of security have been defined. Case studies of this seven-layer IoV architecture have also been performed to illustrate the operation of each layer in real-time. The details of the network model including all the elements inside each component, have also been shown. Results: We have discussed some of the existing communication architecture and listed a few challenges and issues occurring in present scenarios. Considering these issues, which is presently occurring in the existing communication architecture. We have developed the seven-layered IoV architecture and the network model with four essential components known as the cloud, fog, connection, and clients. Conclusion: This proposed architecture provides a secure IoV environment and provides life safety. Hence, safety and security will help to reduce the cybercrimes occurring in the network and provides good coordination and communication of the vehicles in the network.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3663 ◽  
Author(s):  
Seyed Aghili ◽  
Hamid Mala ◽  
Pedro Peris-Lopez

Heterogeneous wireless sensor networks (HWSNs) are employed in many real-time applications, such as Internet of sensors (IoS), Internet of vehicles (IoV), healthcare monitoring, and so on. As wireless sensor nodes have constrained computing, storage and communication capabilities, designing energy-efficient authentication protocols is a very important issue in wireless sensor network security. Recently, Amin et al. presented an untraceable and anonymous three-factor authentication (3FA) scheme for HWSNs and argued that their protocol is efficient and can withstand the common security threats in this sort of networks. In this article, we show how their protocol is not immune to user impersonation, de-synchronization and traceability attacks. In addition, an adversary can disclose session key under the typical assumption that sensors are not tamper-resistant. To overcome these drawbacks, we improve the Amin et al.’s protocol. First, we informally show that our improved scheme is secure against the most common attacks in HWSNs in which the attacks against Amin et al.’s protocol are part of them. Moreover, we verify formally our proposed protocol using the BAN logic. Compared with the Amin et al.’s scheme, the proposed protocol is both more efficient and more secure to be employed which renders the proposal suitable for HWSN networks.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Shu-Chuan Chu ◽  
Saru Kumari ◽  
...  

The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.


Author(s):  
Mumtaz Qabulio ◽  
Yasir Arfat Malkani ◽  
Muhammad S. Memon ◽  
Ayaz Keerio

Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.


2020 ◽  
Vol 12 (10) ◽  
pp. 4105
Author(s):  
Alaa Omran Almagrabi ◽  
Yasser D. Al-Otaibi

Nowadays, communication engineering technology is merging with the Internet of Things (IoT), which consists of numerous connected devices (referred to as things) around the world. Many researchers have shown significant growth of sensor deployments for multiple smart engineering technologies, such as smart-healthcare, smart-industries, smart-cities, and smart-transportation, etc. In such intelligent engineering technologies, sensors continuously generate a bunch of messages in the network. To enhance the value of the data in the messages, we must know the actuality of the data embedded inside the messages. For this purpose, the contextual information of the data creates a vital challenge. Recently, context-aware computing has emerged to be fruitful in dealing with sensor information. In the ubiquitous computing domain, location is commonly considered one of the most essential sources of context. However, whenever users or applications are concerned with objects, and their site or spatial relationships, location models or spatial models are necessary to form a model of the environment. This paper investigates the area of context-aware messaging and addressing services in diverse IoT applications. The paper examines the notion of context and the use of context within the data exchanged by the sensors in an IoT application for messaging and addressing purposes. Based on the importance and need for context of the information, we identify three critical categories of new IoT applications for context-aware messaging and addressing services: emergency applications, applications for guiding and reminding, and social networking applications. For this purpose, a representative range of systems is reviewed according to the application type, the technology being used, their architecture, the context information, and the services they provide. This survey assists the work of defining an approach for context-aware messaging services domain by discovering the area of context-aware messaging.


Sign in / Sign up

Export Citation Format

Share Document