An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs

被引:0
|
作者
Sudhakar, T. [1 ]
Praveen, R. [2 ]
Natarajan, V. [3 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai 600044, Tamil Nadu, India
[2] Natl Inst Technol Puducherry, Dept Comp Sci & Engn, Karaikal 609609, Puducherry, India
[3] Anna Univ, Dept Instrumentat Engn, MIT Campus, Chennai 600044, Tamil Nadu, India
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
IoT network security; User authentication; Secure session; Real-or-random model; Attack resilience; KEY AGREEMENT;
D O I
10.1038/s41598-025-94550-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) are spatially distributed sensor devices that monitor physical or environmental conditions, collect data, and transmit it to a central location for analysis. Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. Numerous mutual authentication schemes have been proposed to address this challenge. Each scheme comes with its own set of advantages and drawbacks. To address the drawbacks in the prevailing schemes, this work presents a strong Two-Factor authentication (2FA) technique designed using Elliptic Curve Cryptography (ECC) and Fuzzy verifier. This approach combines the flexibility of the fuzzy verifier with the cryptographic strength of ECC to create a secure and user-friendly password authentication system to address the long-standing security-usability conflict with computational efficiency. Instead of storing a deterministic hash of the password, the system derives a fuzzy verifier password that includes randomness, makes computationally infeasible to derive. Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. The comparative analysis demonstrates that the proposed scheme achieves a computational cost of 8.9569 ms, which is significantly lower than that of existing schemes. Furthermore, security and functional requirements comparative assessment demonstrates the efficacy and feasibility of our strategy for safeguarding IoT-enabled WSN applications, rendering it a promising solution for implementation in real-world scenario with limited resources.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] An ECC Based Remote User Authentication Protocol
    Shafiq, Akasha
    Altaf, Izwa
    Mahmood, Khalid
    Kumari, Saru
    Chen, Chien-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 285 - 294
  • [2] An ECC-based authentication protocol for fog-IoT enabled smart home environment
    Mohanta B.K.
    Jena D.
    Patnaik S.
    Mohanta, Bhabendu Kumar (C116004@iiit-bh.ac.in), 1600, Inderscience Publishers (20): : 25 - 46
  • [3] Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol
    Debiao He
    Neeraj Kumar
    Naveen Chilamkurti
    Jong-Hyouk Lee
    Journal of Medical Systems, 2014, 38
  • [4] A Lightweight ECC-based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT
    Fariss, Meriam
    El Gafif, Hassan
    Toumanari, Ahmed
    International Journal of Advanced Computer Science and Applications, 2022, 13 (06): : 491 - 501
  • [5] Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol
    He, Debiao
    Kumar, Neeraj
    Chilamkurti, Naveen
    Lee, Jong-Hyouk
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [6] A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs
    Kumar, Ravi
    Singh, Samayveer
    Singh, Pradeep Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [7] Lightweight Authentication Protocol for RFID-enabled Systems based on ECC
    Kaur, Kuljeet
    Kumar, Neeraj
    Singh, Mukesh
    Obaidat, Mohammad S.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [8] ECC-based lightweight mutual authentication protocol for fog enabled IoT system using three-way authentication procedure
    Verma, Upendra
    Bhardwaj, Diwakar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2021, 24 (05) : 505 - 516
  • [9] User authentication protocol based on human memorable password and using ECC
    Park, SB
    Kang, MS
    Lee, SJ
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1091 - 1094
  • [10] A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
    Rangwani, Diksha
    Om, Hari
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (04) : 3865 - 3888