REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security

被引:1
|
作者
Kumar, C. Madan [1 ]
Dwivedi, Sanjeev Kumar [2 ]
Brindha, M. [3 ]
Al-Shehari, Taher [4 ]
Alfakih, Taha [5 ]
Alsalman, Hussain [6 ]
Amin, Ruhul [7 ]
机构
[1] Vaagdevi Coll Engn, Dept Comp Sci & Engn, Bollikunta, Warangal Urban 506005, Telangana, India
[2] Deemed Univ, Madhav Inst Technol & Sci MITS, Gwalior 474005, Madhya Pradesh, India
[3] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli 620015, Tamil Nadu, India
[4] King Saud Univ, Dept Self Dev Skill, Comp Skills, Common First Year Deanship, Riyadh 11362, Saudi Arabia
[5] King Saud Univ, Dept Informat Syst, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[6] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[7] IIIT Naya Raipur, Dept Comp Sci & Engn, Naya Raipur 892002, Chhattisgarh, India
关键词
Executive authentication; Coal mines; Sensor node; Session key agreement; Security attacks; Scyther simulation; WIRELESS SENSOR NETWORKS; AGREEMENT SCHEME; DESIGN;
D O I
10.1007/s12083-024-01806-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The underground environment and its components are susceptible to various attacks due to their role in monitoring environmental conditions and future predictions. Our review of existing literature reveals that most protocols are vulnerable to impersonation and Man-in-the-Middle attacks, which pose significant risks of data theft from sensors. Additionally, these protocols often impose high computational loads on the sensors. To address these challenges, this article presents an inter-mutual authentication scheme tailored for Wireless Sensor Networks (WSNs). We propose a secure authentication and key agreement protocol using the elliptic curve cryptosystem (ECC), which not only provides session key generation and authentication but also protects against several potential attacks. We conducted comprehensive security analyses, including both formal and informal methods, to validate the robustness of our protocol. The informal analysis, based on a threat model, demonstrates the protocol's effectiveness against various critical attacks. The Random Oracle (RoR) model further establishes that breaking the session key security is challenging. Simulations using Scyther confirm that private parameters remain secure during execution, while AVISPA simulations validate the protocol's resilience against replay attack and Man-in-the-Middle attacks. Furthermore, we assessed the security features, computational and communication costs, and overall performance of the proposed scheme, comparing it with existing studies. Our findings indicate that the protocol offers an average improvement of 36.47% and 48-bits for computation and communication overheads. Additionally, this work also offers enhanced security (secure from all possible attacks), making it an effective solution for securing sensitive data in WSNs.
引用
收藏
页码:4264 / 4285
页数:22
相关论文
共 37 条
  • [1] A robust ECC based mutual authentication protocol with anonymity for session initiation protocol
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Li, Linsen
    Alzahrani, Bander
    PLOS ONE, 2017, 12 (10):
  • [2] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609
  • [3] SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks
    Kumar, C. Madan
    Amin, Ruhul
    Brindha, M.
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [4] A robust mutual authentication scheme for session initiation protocol with key establishment
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Anitha, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 900 - 916
  • [5] A robust mutual authentication scheme for session initiation protocol with key establishment
    Venkatasamy Sureshkumar
    Ruhul Amin
    R. Anitha
    Peer-to-Peer Networking and Applications, 2018, 11 : 900 - 916
  • [6] Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol
    Yoon, Eun-Jun
    Shin, Yong-Nyuo
    Jeon, Il-Soo
    Yoo, Kee-Young
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 203 - 213
  • [7] A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol
    Chen, Chien-Ming
    Xiang, Bin
    Wang, King-Hang
    Yeh, Kuo-Hui
    Wu, Tsu-Yang
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [8] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Arezou Ostad-Sharif
    Dariush Abbasinezhad-Mood
    Morteza Nikooghadam
    Journal of Medical Systems, 2019, 43
  • [9] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Ostad-Sharif, Arezou
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (01)
  • [10] Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
    Kim, Mijin
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 204 - 211