Cargando…

An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT

A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and user-repeal facility when a person’s authorizations are...

Descripción completa

Detalles Bibliográficos
Autores principales: Tyagi, Pooja, Kumari, Saru, Alzahrani, Bander A., Gupta, Anshay, Yang, Ming-Hour
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698520/
https://www.ncbi.nlm.nih.gov/pubmed/36433388
http://dx.doi.org/10.3390/s22228793
_version_ 1784838839751147520
author Tyagi, Pooja
Kumari, Saru
Alzahrani, Bander A.
Gupta, Anshay
Yang, Ming-Hour
author_facet Tyagi, Pooja
Kumari, Saru
Alzahrani, Bander A.
Gupta, Anshay
Yang, Ming-Hour
author_sort Tyagi, Pooja
collection PubMed
description A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and user-repeal facility when a person’s authorizations are suddenly disclosed. Singh et al. proposed an improved user authentication and key agreement system for wireless sensor networks (WSNs). Authors are sure that their protocol is secure from various attacks. Here, we find several security pitfalls in their scheme, such as an offline password-guessing attack, failure to protect the session key, and a man-in-the-middle attack. To remove the identified pitfalls found in Singh et al.’s scheme, we design an enhanced authentication scheme for WSNs tailored for IoT. We prove the reliability of our proposed protocol using the real or random (RoR) model. We also evaluate the proposed scheme with the associated schemes and show its superior efficacy as compared to its counterparts.
format Online
Article
Text
id pubmed-9698520
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96985202022-11-26 An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT Tyagi, Pooja Kumari, Saru Alzahrani, Bander A. Gupta, Anshay Yang, Ming-Hour Sensors (Basel) Article A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and user-repeal facility when a person’s authorizations are suddenly disclosed. Singh et al. proposed an improved user authentication and key agreement system for wireless sensor networks (WSNs). Authors are sure that their protocol is secure from various attacks. Here, we find several security pitfalls in their scheme, such as an offline password-guessing attack, failure to protect the session key, and a man-in-the-middle attack. To remove the identified pitfalls found in Singh et al.’s scheme, we design an enhanced authentication scheme for WSNs tailored for IoT. We prove the reliability of our proposed protocol using the real or random (RoR) model. We also evaluate the proposed scheme with the associated schemes and show its superior efficacy as compared to its counterparts. MDPI 2022-11-14 /pmc/articles/PMC9698520/ /pubmed/36433388 http://dx.doi.org/10.3390/s22228793 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tyagi, Pooja
Kumari, Saru
Alzahrani, Bander A.
Gupta, Anshay
Yang, Ming-Hour
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
title An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
title_full An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
title_fullStr An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
title_full_unstemmed An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
title_short An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
title_sort enhanced user authentication and key agreement scheme for wireless sensor networks tailored for iot
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698520/
https://www.ncbi.nlm.nih.gov/pubmed/36433388
http://dx.doi.org/10.3390/s22228793
work_keys_str_mv AT tyagipooja anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT kumarisaru anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT alzahranibandera anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT guptaanshay anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT yangminghour anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT tyagipooja enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT kumarisaru enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT alzahranibandera enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT guptaanshay enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot
AT yangminghour enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot