doi: 10.17586/2226-1494-2022-22-2-332-338


Lightweight ECC and token based authentication mechanism for WSN-IoT

L. Sasirega, C. Shanthi


Read the full article  ';
Article in English

For citation:
Sasirega L., Shanthi C. Lightweight ECC and token based authentication mechanism for WSN-IoT. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 2, pp. 332–338. doi: 10.17586/2226-1494-2022-22-2-332-338


Abstract
The paper deals with Wireless Sensor Networks (WSN) registered in a specific Internet of Things (IoTʼs) network that have different kind of applications. They come into use once they are successfully registered within a specific IoT network. Elliptic Curve Cryptography (ECC) with Token based Security Scheme is proposed here for secured and authenticated communication. A lightweight authentication mechanism is proposed also in order to prevent the network from the unauthorized access. Network nodes are generated with token keys immediately after login, and the gateway generates token ID for each individual nodes. Then elliptical curve cryptography is applied to remove the malicious nodes completely if some adversaries missed out during token key verification process. If the user needs to access the data, he must go through the token key generation and verification phase, as well as through the data integrity and transmission phase.

Keywords: token key, elliptical curve cryptography, ECC, key generator, key verification, wireless sensor network, internet of things, IoT

References
  1. Zhang Q., Fu S., Jia N., Xu M. A verifiable and dynamic multi-keyword ranked search scheme over encrypted cloud data with accuracy improvement. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2018, vol. 254, pp. 588–604. https://doi.org/10.1007/978-3-030-01701-9_32
  2. Shen J., Shen J., Chen X., Huang X., Susilo W. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and Security, 2017, vol. 12, no. 10, pp. 2402–2415. https://doi.org/10.1109/TIFS.2017.2705620
  3. Han G., Wang H., Miao X., Liu L., Jiang J., Peng Y. A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT. IEEE Transactions on Industrial Informatics, 2020, vol. 16, no. 8, pp. 5527–5538. https://doi.org/10.1109/TII.2019.2953937
  4. Far H.A.N., Bayat M., Das A.K., Fotouhi M., Pournaghi S.M., Doostari M.A. LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wireless Networks, 2021, vol. 27, no. 2, pp. 1389–1412. https://doi.org/10.1007/s11276-020-02523-9
  5. Al-Turjman F., Alturjman S. Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Transactions on Industrial Informatics, 2018, vol. 14, no. 6, pp. 2736–2744. https://doi.org/10.1109/TII.2018.2808190
  6. Stallings W. Cryptography and Network Security: Principles and Practice. 5th ed. Pearson Education, 2013.
  7. Verma D., Jain R., Shrivastava A. Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks. IUP Journal of Telecommunications, 2015, vol. 7, no. 3, pp. 15.
  8. Ahmed M.H., Alam S.W., Qureshi N., Baig I. Security for WSN based on elliptic curve cryptography. Proc. of the 1st International Conference on Computer Networks and Information Technology (ICCNIT), 2011, pp. 75–79. https://doi.org/10.1109/ICCNIT.2011.6020911
  9. He D., Chan S., Tang S., Guizani M. Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 2013, vol. 12, no. 9, pp. 4638–4646. https://doi.org/10.1109/TWC.2013.090413.130072
  10. Jawad K., Mansoor K., Baig A.F., Ghani A., Naseem A. An improved three-factor anonymous authentication protocol for WSN s based iot system using symmetric cryptography. Proc. of the 2019 International Conference on Communication Technologies (ComTech), 2019, pp. 53–59. https://doi.org/10.1109/COMTECH.2019.8737799
  11. Kandi M.A., Lakhlef H., Bouabdallah A., Challal Y. An efficient multi-group key management protocol for Internet of Things. Proc. of the 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2018, pp. 438–443. https://doi.org/10.23919/SOFTCOM.2018.8555857
  12. Zhou G.-D., Yi T.-H. Recent developments on wireless sensor networks technology for bridge health monitoring. Mathematical Problems in Engineering, 2013, vol. 2013, pp. 947867. https://doi.org/10.1155/2013/947867
  13. Bhawiyuga A., Data M., Warda A. Architectural design of token based authentication of MQTT protocol in constrained IoT device. Proc. of the 11th International Conference on Telecommunication Systems Services and Applications (TSSA), 2017, pp. 1–4. https://doi.org/10.1109/TSSA.2017.8272933
  14. Dammak M., Boudia O.R.M., Messous M.A., Senouci S.M., Gransart C. Token-based lightweight authentication to secure IoT networks. Proc. of the 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), 2019, pp. 8651825. https://doi.org/10.1109/CCNC.2019.8651825
  15. Li X., Niu J., Bhuiyan M.Z.A., Wu F., Karuppiah M., Kumari S. A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Transactions on Industrial Informatics, 2018, vol. 14, no. 8, pp. 3599–3609. https://doi.org/10.1109/TII.2017.2773666
  16. Kung Y.-H., Hsiao H.-C. GroupIt: Lightweight group key management for dynamic IoT environments. IEEE Internet of Things Journal, 2018, vol. 5, no. 6, pp. 5155–5165. https://doi.org/10.1109/JIOT.2018.2840321
  17. Mughal M.A., Shi P., Ullah A., Mahmood K., Abid M., Luo X. Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN. IEEE Access, 2019, vol. 7, pp. 76699–76711. https://doi.org/10.1109/ACCESS.2019.2921999


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика