Cargando…

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions

The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cyber...

Descripción completa

Detalles Bibliográficos
Autores principales: Eledlebi, Khouloud, Alzubaidi, Ahmed Adel, Yeob Yeun, Chan, Damiani, Ernesto, Mateu, Victor, Al-Hammadi, Yousof
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9737460/
https://www.ncbi.nlm.nih.gov/pubmed/36501765
http://dx.doi.org/10.3390/s22239063
_version_ 1784847294644879360
author Eledlebi, Khouloud
Alzubaidi, Ahmed Adel
Yeob Yeun, Chan
Damiani, Ernesto
Mateu, Victor
Al-Hammadi, Yousof
author_facet Eledlebi, Khouloud
Alzubaidi, Ahmed Adel
Yeob Yeun, Chan
Damiani, Ernesto
Mateu, Victor
Al-Hammadi, Yousof
author_sort Eledlebi, Khouloud
collection PubMed
description The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cybersecurity handling of IoT cannot be achieved in a single broadcast authentication protocol. This paper presents a new hybrid protocol called Hybrid Two-level µ-timed-efficient stream loss-tolerant authentication (Hybrid TLI-µTESLA) protocol, which maximizes the benefits of the previous TESLA protocol variants, including scalability support and immediate authentication of Multilevel-µTESLA protocol and continuous authentication with minimal computation overhead of enhanced Inf-TESLA protocol. The inclusion of three different keychains and checking criteria of the packets in the Hybrid TLI-µTESLA protocol enabled resistance against Masquerading, Modification, Man-in-the-Middle, Brute-force, and DoS attacks. A solution for the authentication problem in the first and last packets of the high-level and low-level keychains of the Multilevel-µTESLA protocol was also proposed. The simulation analysis was performed using Java, where we compared the Hybrid TLI-µTESLA protocol with other variants for time complexity and computation overhead at the sender and receiver sides. We also conducted a comparative analysis between two hash functions, SHA-2 and SHA-3, and assessed the feasibility of the proposed protocol in the forthcoming 6G technology. The results demonstrated the superiority of the proposed protocol over other variants in terms of immediate and continuous authentication, scalability, cybersecurity, lifetime, network performance, and compatibility with 5G and 6G IoT generations.
format Online
Article
Text
id pubmed-9737460
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97374602022-12-11 Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions Eledlebi, Khouloud Alzubaidi, Ahmed Adel Yeob Yeun, Chan Damiani, Ernesto Mateu, Victor Al-Hammadi, Yousof Sensors (Basel) Article The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cybersecurity handling of IoT cannot be achieved in a single broadcast authentication protocol. This paper presents a new hybrid protocol called Hybrid Two-level µ-timed-efficient stream loss-tolerant authentication (Hybrid TLI-µTESLA) protocol, which maximizes the benefits of the previous TESLA protocol variants, including scalability support and immediate authentication of Multilevel-µTESLA protocol and continuous authentication with minimal computation overhead of enhanced Inf-TESLA protocol. The inclusion of three different keychains and checking criteria of the packets in the Hybrid TLI-µTESLA protocol enabled resistance against Masquerading, Modification, Man-in-the-Middle, Brute-force, and DoS attacks. A solution for the authentication problem in the first and last packets of the high-level and low-level keychains of the Multilevel-µTESLA protocol was also proposed. The simulation analysis was performed using Java, where we compared the Hybrid TLI-µTESLA protocol with other variants for time complexity and computation overhead at the sender and receiver sides. We also conducted a comparative analysis between two hash functions, SHA-2 and SHA-3, and assessed the feasibility of the proposed protocol in the forthcoming 6G technology. The results demonstrated the superiority of the proposed protocol over other variants in terms of immediate and continuous authentication, scalability, cybersecurity, lifetime, network performance, and compatibility with 5G and 6G IoT generations. MDPI 2022-11-22 /pmc/articles/PMC9737460/ /pubmed/36501765 http://dx.doi.org/10.3390/s22239063 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Eledlebi, Khouloud
Alzubaidi, Ahmed Adel
Yeob Yeun, Chan
Damiani, Ernesto
Mateu, Victor
Al-Hammadi, Yousof
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
title Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
title_full Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
title_fullStr Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
title_full_unstemmed Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
title_short Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions
title_sort simulation analysis and comparison of new hybrid tli-µtesla and variant tesla protocols using sha-2 and sha-3 hash functions
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9737460/
https://www.ncbi.nlm.nih.gov/pubmed/36501765
http://dx.doi.org/10.3390/s22239063
work_keys_str_mv AT eledlebikhouloud simulationanalysisandcomparisonofnewhybridtliμteslaandvariantteslaprotocolsusingsha2andsha3hashfunctions
AT alzubaidiahmedadel simulationanalysisandcomparisonofnewhybridtliμteslaandvariantteslaprotocolsusingsha2andsha3hashfunctions
AT yeobyeunchan simulationanalysisandcomparisonofnewhybridtliμteslaandvariantteslaprotocolsusingsha2andsha3hashfunctions
AT damianiernesto simulationanalysisandcomparisonofnewhybridtliμteslaandvariantteslaprotocolsusingsha2andsha3hashfunctions
AT mateuvictor simulationanalysisandcomparisonofnewhybridtliμteslaandvariantteslaprotocolsusingsha2andsha3hashfunctions
AT alhammadiyousof simulationanalysisandcomparisonofnewhybridtliμteslaandvariantteslaprotocolsusingsha2andsha3hashfunctions