Skoči na glavni sadržaj

Izvorni znanstveni članak

https://doi.org/10.24138/jcomss-2023-0068

User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context

Benfilali Mostefa ; EEDIS Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria *
Gafour Abdelkader ; EEDIS Laboratory, Djillali Liabes University, Sidi Bel Abbes, Algeria
Belghachi Mohamed ; Tahri Mohamed University, Department of Mathematic and Computer Sciences, Bechar, Algeria

* Dopisni autor.


Puni tekst: engleski pdf 1.892 Kb

str. 186-197

preuzimanja: 108

citiraj


Sažetak

Recently, the numerous academic papers have been published on Authentication and Key Agreement (AKA) schemes for securing wireless sensor networks (WSN) in the context of the Internet of Things (IoT). The goal of these schemes is to protect external users’ access to data collected by WSNs . Due to limited resources and the wireless communication medium, the sensor nodes are vulnerable to multiple attacks performed by malicious user’s. Unfortunately, most of the proposed schemes are insecure and require higher storage, communication and computing costs. This paper presents a User Authentication protocol to secure WSNs Access in the IoT context (UAWSNAIoT). The BAN-Logic and Real-Or-Random (ROR) models are used to demonstrate the reliability of UAWSNA-IoT in meeting all requirements for mutual authentication and session key security, respectively. In addition, UAWSNA-IoT offers high security with low computational, storage and communication overhead, making it an ideal choice for resource-constrained IoT devices such as WSNs.

Ključne riječi

Internet of Things; Wireless Sensor Networks; mutual authentication; Authentication and Key Agreement; User Authentication; Session Key; BAN-Logic; ROR model

Hrčak ID:

317772

URI

https://hrcak.srce.hr/317772

Datum izdavanja:

30.6.2024.

Posjeta: 359 *