REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security

被引:1
|
作者
Kumar, C. Madan [1 ]
Dwivedi, Sanjeev Kumar [2 ]
Brindha, M. [3 ]
Al-Shehari, Taher [4 ]
Alfakih, Taha [5 ]
Alsalman, Hussain [6 ]
Amin, Ruhul [7 ]
机构
[1] Vaagdevi Coll Engn, Dept Comp Sci & Engn, Bollikunta, Warangal Urban 506005, Telangana, India
[2] Deemed Univ, Madhav Inst Technol & Sci MITS, Gwalior 474005, Madhya Pradesh, India
[3] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli 620015, Tamil Nadu, India
[4] King Saud Univ, Dept Self Dev Skill, Comp Skills, Common First Year Deanship, Riyadh 11362, Saudi Arabia
[5] King Saud Univ, Dept Informat Syst, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[6] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[7] IIIT Naya Raipur, Dept Comp Sci & Engn, Naya Raipur 892002, Chhattisgarh, India
关键词
Executive authentication; Coal mines; Sensor node; Session key agreement; Security attacks; Scyther simulation; WIRELESS SENSOR NETWORKS; AGREEMENT SCHEME; DESIGN;
D O I
10.1007/s12083-024-01806-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The underground environment and its components are susceptible to various attacks due to their role in monitoring environmental conditions and future predictions. Our review of existing literature reveals that most protocols are vulnerable to impersonation and Man-in-the-Middle attacks, which pose significant risks of data theft from sensors. Additionally, these protocols often impose high computational loads on the sensors. To address these challenges, this article presents an inter-mutual authentication scheme tailored for Wireless Sensor Networks (WSNs). We propose a secure authentication and key agreement protocol using the elliptic curve cryptosystem (ECC), which not only provides session key generation and authentication but also protects against several potential attacks. We conducted comprehensive security analyses, including both formal and informal methods, to validate the robustness of our protocol. The informal analysis, based on a threat model, demonstrates the protocol's effectiveness against various critical attacks. The Random Oracle (RoR) model further establishes that breaking the session key security is challenging. Simulations using Scyther confirm that private parameters remain secure during execution, while AVISPA simulations validate the protocol's resilience against replay attack and Man-in-the-Middle attacks. Furthermore, we assessed the security features, computational and communication costs, and overall performance of the proposed scheme, comparing it with existing studies. Our findings indicate that the protocol offers an average improvement of 36.47% and 48-bits for computation and communication overheads. Additionally, this work also offers enhanced security (secure from all possible attacks), making it an effective solution for securing sensitive data in WSNs.
引用
收藏
页码:4264 / 4285
页数:22
相关论文
共 37 条
  • [21] Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    Tang, Hongbin
    Liu, Xinsong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (03) : 321 - 333
  • [22] A Lightweight ECC-based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT
    Fariss, Meriam
    El Gafif, Hassan
    Toumanari, Ahmed
    International Journal of Advanced Computer Science and Applications, 2022, 13 (06): : 491 - 501
  • [23] An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards
    Reddy, Goutham A.
    Lee, Gil-Je
    Yoo, Kee-Young
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 169 - 174
  • [24] A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication
    Ruhul Amin
    SK Hafizul Islam
    Pandi Vijayakumar
    Muhammad Khurram Khan
    Victor Chang
    Multimedia Tools and Applications, 2018, 77 : 11041 - 11066
  • [25] A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication
    Amin, Ruhul
    Islam, S. K. Hafizul
    Vijayakumar, Pandi
    Khan, Muhammad Khurram
    Chang, Victor
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 11041 - 11066
  • [26] A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [27] Design of Robust Mutual Authentication and Key Establishment Security Protocol for Cloud-Enabled Smart Grid Communication
    Sureshkumar, Venkatasamy
    Anandhi, S.
    Amin, Ruhul
    Selvarajan, N.
    Madhumathi, R.
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3565 - 3572
  • [28] Shared group session key-based conditional privacy-preserving authentication protocol for VANETs
    Zhang, Run
    Zhou, Wenan
    VEHICULAR COMMUNICATIONS, 2024, 47
  • [29] RELAKA: Robust ECC based Privacy Preserving Lightweight Authenticated Key Agreement protocol for healthcare applications
    Kousalya, R.
    Kumar, G. A. Sathish
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2024, 59
  • [30] A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments
    Yuan, Minghua
    Tan, Haowen
    Zheng, Wenying
    Vijayakumar, P.
    Alqahtani, Fayez
    Tolba, Amr
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 29615 - 29627