REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security

被引:1
|
作者
Kumar, C. Madan [1 ]
Dwivedi, Sanjeev Kumar [2 ]
Brindha, M. [3 ]
Al-Shehari, Taher [4 ]
Alfakih, Taha [5 ]
Alsalman, Hussain [6 ]
Amin, Ruhul [7 ]
机构
[1] Vaagdevi Coll Engn, Dept Comp Sci & Engn, Bollikunta, Warangal Urban 506005, Telangana, India
[2] Deemed Univ, Madhav Inst Technol & Sci MITS, Gwalior 474005, Madhya Pradesh, India
[3] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli 620015, Tamil Nadu, India
[4] King Saud Univ, Dept Self Dev Skill, Comp Skills, Common First Year Deanship, Riyadh 11362, Saudi Arabia
[5] King Saud Univ, Dept Informat Syst, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[6] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh 11543, Saudi Arabia
[7] IIIT Naya Raipur, Dept Comp Sci & Engn, Naya Raipur 892002, Chhattisgarh, India
关键词
Executive authentication; Coal mines; Sensor node; Session key agreement; Security attacks; Scyther simulation; WIRELESS SENSOR NETWORKS; AGREEMENT SCHEME; DESIGN;
D O I
10.1007/s12083-024-01806-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The underground environment and its components are susceptible to various attacks due to their role in monitoring environmental conditions and future predictions. Our review of existing literature reveals that most protocols are vulnerable to impersonation and Man-in-the-Middle attacks, which pose significant risks of data theft from sensors. Additionally, these protocols often impose high computational loads on the sensors. To address these challenges, this article presents an inter-mutual authentication scheme tailored for Wireless Sensor Networks (WSNs). We propose a secure authentication and key agreement protocol using the elliptic curve cryptosystem (ECC), which not only provides session key generation and authentication but also protects against several potential attacks. We conducted comprehensive security analyses, including both formal and informal methods, to validate the robustness of our protocol. The informal analysis, based on a threat model, demonstrates the protocol's effectiveness against various critical attacks. The Random Oracle (RoR) model further establishes that breaking the session key security is challenging. Simulations using Scyther confirm that private parameters remain secure during execution, while AVISPA simulations validate the protocol's resilience against replay attack and Man-in-the-Middle attacks. Furthermore, we assessed the security features, computational and communication costs, and overall performance of the proposed scheme, comparing it with existing studies. Our findings indicate that the protocol offers an average improvement of 36.47% and 48-bits for computation and communication overheads. Additionally, this work also offers enhanced security (secure from all possible attacks), making it an effective solution for securing sensitive data in WSNs.
引用
收藏
页码:4264 / 4285
页数:22
相关论文
共 37 条
  • [31] An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 1 - 19
  • [32] A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
    Xiong Li
    Jianwei Niu
    Saru Kumari
    SK Hafizul Islam
    Fan Wu
    Muhammad Khurram Khan
    Ashok Kumar Das
    Wireless Personal Communications, 2016, 89 : 569 - 597
  • [33] A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Islam, S. K. Hafizul
    Wu, Fan
    Khan, Muhammad Khurram
    Das, Ashok Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 569 - 597
  • [34] A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Abdulhay, Enas
    Li, Fagen
    Reddy, M. Krishna Chaitanya
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 216 - 227
  • [35] A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT
    Zou, Shihong
    Cao, Qiang
    Huangqi, Chonghui
    Huang, Anpeng
    Li, Yanping
    Wang, Chenyu
    Xu, Guoai
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (17): : 29174 - 29189
  • [36] Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (01) : 155 - 170
  • [37] S2 DN : Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs
    Pali, Isha
    Abdussami, Mohammad
    Amin, Ruhul
    Al-Shehari, Taher
    Al-Razgan, Muna
    Alfakih, Taha
    VEHICULAR COMMUNICATIONS, 2024, 47