An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs

被引:0
|
作者
Sudhakar, T. [1 ]
Praveen, R. [2 ]
Natarajan, V. [3 ]
机构
[1] Anna Univ, Dept Comp Technol, MIT Campus, Chennai 600044, Tamil Nadu, India
[2] Natl Inst Technol Puducherry, Dept Comp Sci & Engn, Karaikal 609609, Puducherry, India
[3] Anna Univ, Dept Instrumentat Engn, MIT Campus, Chennai 600044, Tamil Nadu, India
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
IoT network security; User authentication; Secure session; Real-or-random model; Attack resilience; KEY AGREEMENT;
D O I
10.1038/s41598-025-94550-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) are spatially distributed sensor devices that monitor physical or environmental conditions, collect data, and transmit it to a central location for analysis. Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. Numerous mutual authentication schemes have been proposed to address this challenge. Each scheme comes with its own set of advantages and drawbacks. To address the drawbacks in the prevailing schemes, this work presents a strong Two-Factor authentication (2FA) technique designed using Elliptic Curve Cryptography (ECC) and Fuzzy verifier. This approach combines the flexibility of the fuzzy verifier with the cryptographic strength of ECC to create a secure and user-friendly password authentication system to address the long-standing security-usability conflict with computational efficiency. Instead of storing a deterministic hash of the password, the system derives a fuzzy verifier password that includes randomness, makes computationally infeasible to derive. Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. The comparative analysis demonstrates that the proposed scheme achieves a computational cost of 8.9569 ms, which is significantly lower than that of existing schemes. Furthermore, security and functional requirements comparative assessment demonstrates the efficacy and feasibility of our strategy for safeguarding IoT-enabled WSN applications, rendering it a promising solution for implementation in real-world scenario with limited resources.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
    Chatterjee, Urbi
    Govindan, Vidya
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 424 - 437
  • [42] Mutual Authentication Protocol for RFID based on ECC
    Zheng, Lijuan
    Xue, Yujuan
    Zhang, Linhao
    Zhang, Rui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 320 - 323
  • [43] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [44] TBVPAKE: An efficient and provably secure verifier-based PAKE protocol for IoT applications
    Qi, Mingping
    Cui, Zhiyao
    Liang, Gaowei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [45] ERAP: ECC based RFID Authentication Protocol
    Ahamed, Sheikh Iqbal
    Rahman, Farzana
    Hoque, Md. Endadul
    12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, : 219 - 225
  • [46] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [47] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    JournalofElectronicScienceandTechnology, 2020, 18 (04) : 320 - 329
  • [48] An efficient user authentication model for IOT-based healthcare environment
    Elngar A.A.
    International Journal of Information and Computer Security, 2019, 11 (4-5): : 431 - 446
  • [49] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (01) : 171 - 192
  • [50] A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Peer-to-Peer Networking and Applications, 2016, 9 : 171 - 192