Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Gope, Prosanta; Das, Ashok Kumar; Kumar, Neeraj; Cheng, Yongqiang
Ashok Kumar Das
Dr Yongqiang Cheng Y.Cheng@hull.ac.uk
Industrial Wireless Sensor Network (IWSN) is an emerging class of a generalized Wireless Sensor Network (WSN) having constraints of energy consumption, coverage, connectivity, and security. However, security and privacy is one of the major challenges in IWSN as the nodes are connected to Internet and usually located in an unattended environment with minimum human interventions. In IWSN, there is a fundamental requirement for a user to access the real-time information directly from the designated sensor nodes. This task demands to have a user authentication protocol. To satisfy this requirement, this article proposes a lightweight and privacy-preserving mutual user authentication protocol in which only the user with a trusted device has the right to access the IWSN. Therefore, in the proposed scheme, we considered the physical layer security of the sensor nodes. We show that the proposed scheme ensures security even if a sensor node is captured by an adversary. The proposed protocol uses the lightweight cryptographic primitives, such as one way cryptographic hash function, Physically Unclonable Function (PUF) and bitwise exclusive (XOR) operations. Security and performance analysis shows that the proposed scheme is secure, and is efficient for the resource-constrained sensing devices in IWSN.
|Journal Article Type||Article|
|Journal||IEEE Transactions on Industrial Informatics|
|Publisher||Institute of Electrical and Electronics Engineers|
|Peer Reviewed||Peer Reviewed|
|APA6 Citation||Gope, P., Das, A. K., Kumar, N., & Cheng, Y. (2019). Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 1-1. https://doi.org/10.1109/tii.2019.2895030|
|Keywords||Control and Systems Engineering; Electrical and Electronic Engineering; Information Systems; Computer Science Applications|
Gope et al
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
You might also like
Lightweight and privacy-preserving two-factor authentication scheme for IoT devices
Privacy-aware authenticated key agreement scheme for secure smart grid communication