Menu
Publications
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
Editor-in-Chief
Nikiforov
Vladimir O.
D.Sc., Prof.
Partners
doi: 10.17586/2226-1494-2022-22-2-332-338
Lightweight ECC and token based authentication mechanism for WSN-IoT
Read the full article ';
Article in English
For citation:
Abstract
For citation:
Sasirega L., Shanthi C. Lightweight ECC and token based authentication mechanism for WSN-IoT. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 2, pp. 332–338. doi: 10.17586/2226-1494-2022-22-2-332-338
Abstract
The paper deals with Wireless Sensor Networks (WSN) registered in a specific Internet of Things (IoTʼs) network that have different kind of applications. They come into use once they are successfully registered within a specific IoT network. Elliptic Curve Cryptography (ECC) with Token based Security Scheme is proposed here for secured and authenticated communication. A lightweight authentication mechanism is proposed also in order to prevent the network from the unauthorized access. Network nodes are generated with token keys immediately after login, and the gateway generates token ID for each individual nodes. Then elliptical curve cryptography is applied to remove the malicious nodes completely if some adversaries missed out during token key verification process. If the user needs to access the data, he must go through the token key generation and verification phase, as well as through the data integrity and transmission phase.
Keywords: token key, elliptical curve cryptography, ECC, key generator, key verification, wireless sensor network, internet of things, IoT
References
References
-
Zhang Q., Fu S., Jia N., Xu M. A verifiable and dynamic multi-keyword ranked search scheme over encrypted cloud data with accuracy improvement. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2018, vol. 254, pp. 588–604. https://doi.org/10.1007/978-3-030-01701-9_32
-
Shen J., Shen J., Chen X., Huang X., Susilo W. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and Security, 2017, vol. 12, no. 10, pp. 2402–2415. https://doi.org/10.1109/TIFS.2017.2705620
-
Han G., Wang H., Miao X., Liu L., Jiang J., Peng Y. A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT. IEEE Transactions on Industrial Informatics, 2020, vol. 16, no. 8, pp. 5527–5538. https://doi.org/10.1109/TII.2019.2953937
-
Far H.A.N., Bayat M., Das A.K., Fotouhi M., Pournaghi S.M., Doostari M.A. LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wireless Networks, 2021, vol. 27, no. 2, pp. 1389–1412. https://doi.org/10.1007/s11276-020-02523-9
-
Al-Turjman F., Alturjman S. Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Transactions on Industrial Informatics, 2018, vol. 14, no. 6, pp. 2736–2744. https://doi.org/10.1109/TII.2018.2808190
-
Stallings W. Cryptography and Network Security: Principles and Practice. 5th ed. Pearson Education, 2013.
-
Verma D., Jain R., Shrivastava A. Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks. IUP Journal of Telecommunications, 2015, vol. 7, no. 3, pp. 15.
-
Ahmed M.H., Alam S.W., Qureshi N., Baig I. Security for WSN based on elliptic curve cryptography. Proc. of the 1st International Conference on Computer Networks and Information Technology (ICCNIT), 2011, pp. 75–79. https://doi.org/10.1109/ICCNIT.2011.6020911
-
He D., Chan S., Tang S., Guizani M. Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 2013, vol. 12, no. 9, pp. 4638–4646. https://doi.org/10.1109/TWC.2013.090413.130072
-
Jawad K., Mansoor K., Baig A.F., Ghani A., Naseem A. An improved three-factor anonymous authentication protocol for WSN s based iot system using symmetric cryptography. Proc. of the 2019 International Conference on Communication Technologies (ComTech), 2019, pp. 53–59. https://doi.org/10.1109/COMTECH.2019.8737799
-
Kandi M.A., Lakhlef H., Bouabdallah A., Challal Y. An efficient multi-group key management protocol for Internet of Things. Proc. of the 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2018, pp. 438–443. https://doi.org/10.23919/SOFTCOM.2018.8555857
-
Zhou G.-D., Yi T.-H. Recent developments on wireless sensor networks technology for bridge health monitoring. Mathematical Problems in Engineering, 2013, vol. 2013, pp. 947867. https://doi.org/10.1155/2013/947867
-
Bhawiyuga A., Data M., Warda A. Architectural design of token based authentication of MQTT protocol in constrained IoT device. Proc. of the 11th International Conference on Telecommunication Systems Services and Applications (TSSA), 2017, pp. 1–4. https://doi.org/10.1109/TSSA.2017.8272933
-
Dammak M., Boudia O.R.M., Messous M.A., Senouci S.M., Gransart C. Token-based lightweight authentication to secure IoT networks. Proc. of the 16th IEEE Annual Consumer Communications and Networking Conference (CCNC), 2019, pp. 8651825. https://doi.org/10.1109/CCNC.2019.8651825
-
Li X., Niu J., Bhuiyan M.Z.A., Wu F., Karuppiah M., Kumari S. A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things. IEEE Transactions on Industrial Informatics, 2018, vol. 14, no. 8, pp. 3599–3609. https://doi.org/10.1109/TII.2017.2773666
-
Kung Y.-H., Hsiao H.-C. GroupIt: Lightweight group key management for dynamic IoT environments. IEEE Internet of Things Journal, 2018, vol. 5, no. 6, pp. 5155–5165. https://doi.org/10.1109/JIOT.2018.2840321
-
Mughal M.A., Shi P., Ullah A., Mahmood K., Abid M., Luo X. Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN. IEEE Access, 2019, vol. 7, pp. 76699–76711. https://doi.org/10.1109/ACCESS.2019.2921999