An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs

被引:0
|
作者
Sudhakar, T. [1 ]
Praveen, R. [2 ]
Natarajan, V. [3 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai 600044, Tamil Nadu, India
[2] Natl Inst Technol Puducherry, Dept Comp Sci & Engn, Karaikal 609609, Puducherry, India
[3] Anna Univ, Dept Instrumentat Engn, MIT Campus, Chennai 600044, Tamil Nadu, India
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
IoT network security; User authentication; Secure session; Real-or-random model; Attack resilience; KEY AGREEMENT;
D O I
10.1038/s41598-025-94550-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) are spatially distributed sensor devices that monitor physical or environmental conditions, collect data, and transmit it to a central location for analysis. Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. Numerous mutual authentication schemes have been proposed to address this challenge. Each scheme comes with its own set of advantages and drawbacks. To address the drawbacks in the prevailing schemes, this work presents a strong Two-Factor authentication (2FA) technique designed using Elliptic Curve Cryptography (ECC) and Fuzzy verifier. This approach combines the flexibility of the fuzzy verifier with the cryptographic strength of ECC to create a secure and user-friendly password authentication system to address the long-standing security-usability conflict with computational efficiency. Instead of storing a deterministic hash of the password, the system derives a fuzzy verifier password that includes randomness, makes computationally infeasible to derive. Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. The comparative analysis demonstrates that the proposed scheme achieves a computational cost of 8.9569 ms, which is significantly lower than that of existing schemes. Furthermore, security and functional requirements comparative assessment demonstrates the efficacy and feasibility of our strategy for safeguarding IoT-enabled WSN applications, rendering it a promising solution for implementation in real-world scenario with limited resources.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction
    Taher, Bahaa Hussein
    Jiang, Sheng
    Yassin, Ali A.
    Lu, Hongwei
    IEEE ACCESS, 2019, 7 : 148950 - 148966
  • [22] E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT
    Zeng, Xianjiao
    Xu, Guangquan
    Zheng, Xi
    Xiang, Yang
    Zhou, Wanlei
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1506 - 1519
  • [23] Lightweight Authentication Scheme Based on ECC for IoT
    Sweta Mishra
    Bhaskar Mondal
    Rishi Kumar Jha
    SN Computer Science, 5 (7)
  • [24] A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database
    Nimmy, K.
    Sankaran, Sriram
    Achuthan, Krishnashree
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (5) : 6227 - 6242
  • [25] A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database
    K. Nimmy
    Sriram Sankaran
    Krishnashree Achuthan
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 6227 - 6242
  • [26] ERASMIS: An ECC-based robust authentication protocol suitable for medical IoT systems
    Servati, Mohammad Reza
    Safkhani, Masoumeh
    Rahmani, Amir Masoud
    Hosseinzadeh, Mehdi
    COMPUTER NETWORKS, 2025, 258
  • [27] Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications
    Gabsi, Souhir
    Kortli, Yassin
    Beroulle, Vincent
    Kieffer, Yann
    Alasiry, Areej
    Hamdi, Belgacem
    IEEE ACCESS, 2021, 9 : 130895 - 130913
  • [28] EBIAS: ECC-enabled blockchain-based identity authentication scheme for IoT device
    Wang, Wenyue
    Yan, Biwei
    Chai, Baobao
    Shen, Ruiyao
    Dong, Anming
    Yu, Jiguo
    HIGH-CONFIDENCE COMPUTING, 2025, 5 (01):
  • [29] A CRC-Based Authentication Model and ECC-Based Authentication Protocol for Resource-Constrained IoT Applications
    Keshta, Ismail
    IEEE ACCESS, 2024, 12 : 156765 - 156784
  • [30] A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
    Chen, Chien-Ming
    Liu, Shuangshuang
    Chaudhry, Shehzad Ashraf
    Chen, Yeh-Cheng
    Khan, Muhammad Asghar
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (01): : 307 - 329