doi: 10.17586/2226-1494-2021-21-6-929-935


Bi-level authentication and mannequin routing for improving security features of WSN-IoT

S. Loganathan, C. Shanthi


Read the full article  ';
Article in English

For citation:
Sasirega L., Shanthi Ch. Bi-level authentication and mannequin routing for improving security features of WSN-IoT. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2021, vol. 21, no. 6, pp. 929–935. doi: 10.17586/2226-1494-2021-21-6-929-935


Abstract
Node authentication and key management are the two significant security services employed in Wireless Sensor Networks (WSN). Since the growth of the devices in WSN is rapidly increasing, strong security policies should be employed to save the network from outside invaders. There is a wide range of smart applications developed in various fields such as military, health, agriculture, smart city, and many others. Since most of the applications consist of sensitive data, they should be protected to save the users’ privacy. Conventional protocols are more prone to security attacks and therefore the authors propose a secure and reliable protocol named Polynomial Authentication and Mapping Verification based Mannequin Routing (PAMVMR). This scheme involves two main processes such as Bi-level authentication and Information Processing. Bi-level authentication includes node-to-gateway authentication using polynomial key shares and node-to-node verification using mapping function that is processed through a context free grammar. Information processing includes creation of mannequin routes by applying Pascal’s triangle method and transmission of data. This makes the network more secure and reliable for data transmission from sensor nodes to a gateway node and from a gateway to users.

Keywords: Bi-level authentication, polynomial token, mapping variables, mannequin route, Pascal’s binomial triangle

References
  1. Sharma R., Prakash S., Roy P. Methodology, applications, and challenges of WSN-IoT. Proc. of the International Conference on Electrical and Electronics Engineering (ICE3), 2020, pp. 502–507. https://doi.org/10.1109/ICE348803.2020.9122891
  2. Nguyen T.M.C., Hoang D.B., Chaczko Z. Can SDN technology be transported to software-defined WSN/IOT? Proc. of the 2016 IEEE International Conference on Internet of Things (iThings), IEEE Green Computing and Communications (GreenCom), IEEE Cyber, Physical and Social Computing (CPSCom), IEEE Smart Data (SmartData), 2016, pp. 234–239. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.63
  3. Ezdiani S., Acharyya I.S., Sivakumar S., Al-Anbuky A. An IoT environment for WSN adaptive QoS. Proc. of the 2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS), 2015, pp. 586–593. https://doi.org/10.1109/DSDIS.2015.28
  4. Xue K., Ma C., Hong P., Ding R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 2013, vol. 36, no. 1, pp. 316–323. https://doi.org/10.1016/j.jnca.2012.05.010
  5. Turkanović M., Brumen B., Hölbl M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, 2014, vol. 20, pp. 96–112. https://doi.org/10.1016/j.adhoc.2014.03.009
  6. Amin R., Biswas G.P. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks, 2016, vol. 36, pp. 58–80. https://doi.org/10.1016/j.adhoc.2015.05.020
  7. Wang D., Li W., Wang P. Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 2018, vol. 14, no. 9, pp. 4081–4092. https://doi.org/10.1109/TII.2018.2834351
  8. Jiang Q., Ma J., Wei F., Tian Y., Shen J., Yang Y. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications, 2016, vol. 76, pp. 37–48. https://doi.org/10.1016/j.jnca.2016.10.001
  9. Liu X., Shen Y., Li S., Chen F. A fingerprint-based user authentication protocol with one-time password for wireless sensor networks. Proc. of 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, 2013, pp. 9–12. https://doi.org/10.1109/SNS-PCS.2013.6553825
  10. Gurabi M.A., Alfandi O., Bochem A., Hogrefe D. Hardware based two-factor user authentication for the Internet of Things. Proc. of the 14th International Wireless Communications and Mobile Computing Conference (IWCMC), 2018, pp. 1081–1086. https://doi.org/10.1109/IWCMC.2018.8450397
  11. Wang D., Wang P., Wang C. Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs. ACM Transactions on Cyber-Physical Systems, 2020, vol. 4, no. 3, pp. 3325130. https://doi.org/10.1145/3325130
  12. Selva Reegan S.R.A., Baburaj E. Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. Computers and Electrical Engineering, 2017, vol. 59, pp. 274–290. https://doi.org/10.1016/j.compeleceng.2016.10.018
  13. Fan X., Gong G. LPKM: A lightweight polynomial-based key management protocol for distributed wireless sensor networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2013, vol. 111, pp. 180–195. https://doi.org/10.1007/978-3-642-36958-2_13
  14. Li X., Niu J., Kumari S., Wu F., Sangaiah A.K., Choo K.K.R. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 2018, vol. 103, pp. 194–204. https://doi.org/10.1016/j.jnca.2017.07.001
  15. Nashwan S. AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment. Egyptian Informatics Journal, 2021, vol. 22, no. 1, pp. 15–26. https://doi.org/10.1016/j.eij.2020.02.005
  16. Cheng Q., Hsu C., Xia Z., Harn L. Fast multivariate-polynomial-based membership authentication and key establishment for secure group communications in WSN. IEEE Access, 2020, vol. 8, pp. 71833–71839. https://doi.org/10.1109/ACCESS.2020.2987978
  17. Yang S.-K., Shiue Y.-M., Su Z.-Y., Liu I.-H., Liu C.-G. An authentication information exchange scheme in WSN for IoT applications. IEEE Access, 2020, vol. 8, pp. 9728–9738. https://doi.org/10.1109/ACCESS.2020.2964815


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика