Cargando…
An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT
A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and user-repeal facility when a person’s authorizations are...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698520/ https://www.ncbi.nlm.nih.gov/pubmed/36433388 http://dx.doi.org/10.3390/s22228793 |
_version_ | 1784838839751147520 |
---|---|
author | Tyagi, Pooja Kumari, Saru Alzahrani, Bander A. Gupta, Anshay Yang, Ming-Hour |
author_facet | Tyagi, Pooja Kumari, Saru Alzahrani, Bander A. Gupta, Anshay Yang, Ming-Hour |
author_sort | Tyagi, Pooja |
collection | PubMed |
description | A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and user-repeal facility when a person’s authorizations are suddenly disclosed. Singh et al. proposed an improved user authentication and key agreement system for wireless sensor networks (WSNs). Authors are sure that their protocol is secure from various attacks. Here, we find several security pitfalls in their scheme, such as an offline password-guessing attack, failure to protect the session key, and a man-in-the-middle attack. To remove the identified pitfalls found in Singh et al.’s scheme, we design an enhanced authentication scheme for WSNs tailored for IoT. We prove the reliability of our proposed protocol using the real or random (RoR) model. We also evaluate the proposed scheme with the associated schemes and show its superior efficacy as compared to its counterparts. |
format | Online Article Text |
id | pubmed-9698520 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96985202022-11-26 An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT Tyagi, Pooja Kumari, Saru Alzahrani, Bander A. Gupta, Anshay Yang, Ming-Hour Sensors (Basel) Article A security protocol for wireless transmission is essential to defend sensitive information from malicious enemies by providing a variety of facilities such as privacy of the user’s information, secure session key, associated authentication, and user-repeal facility when a person’s authorizations are suddenly disclosed. Singh et al. proposed an improved user authentication and key agreement system for wireless sensor networks (WSNs). Authors are sure that their protocol is secure from various attacks. Here, we find several security pitfalls in their scheme, such as an offline password-guessing attack, failure to protect the session key, and a man-in-the-middle attack. To remove the identified pitfalls found in Singh et al.’s scheme, we design an enhanced authentication scheme for WSNs tailored for IoT. We prove the reliability of our proposed protocol using the real or random (RoR) model. We also evaluate the proposed scheme with the associated schemes and show its superior efficacy as compared to its counterparts. MDPI 2022-11-14 /pmc/articles/PMC9698520/ /pubmed/36433388 http://dx.doi.org/10.3390/s22228793 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tyagi, Pooja Kumari, Saru Alzahrani, Bander A. Gupta, Anshay Yang, Ming-Hour An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT |
title | An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT |
title_full | An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT |
title_fullStr | An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT |
title_full_unstemmed | An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT |
title_short | An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT |
title_sort | enhanced user authentication and key agreement scheme for wireless sensor networks tailored for iot |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9698520/ https://www.ncbi.nlm.nih.gov/pubmed/36433388 http://dx.doi.org/10.3390/s22228793 |
work_keys_str_mv | AT tyagipooja anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT kumarisaru anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT alzahranibandera anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT guptaanshay anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT yangminghour anenhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT tyagipooja enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT kumarisaru enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT alzahranibandera enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT guptaanshay enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot AT yangminghour enhanceduserauthenticationandkeyagreementschemeforwirelesssensornetworkstailoredforiot |