Abstract:Wireless sensor networks (WSNs) are widely used in large areas of applications; due to advancements in technology, very tiny sensors are readily available, and their usage reduces the cost. The mechanisms designed for wireless networks cannot be implied on networks with tiny nodes due to battery and computational constraints. Understanding the significance of security in WSNs and resource constraintness of tiny WSNs, we propose a node authentication mechanism for nodes in wireless sensor networks to avoid secu… Show more
“…Traceability The existing authentication protocols [16,19,20] cannot offer a reliable feature of traceability as the pseudo-identities are known to the communication network. However, the proposed S-USI can compute the real identities of client/server to protect the pseudonym identities when M d ∕M s derives the anonymity function using key = PRF S k (H(I d )) ⊕ H � (S k 0 ) .…”
Section: Resilient To Replay Attackmentioning
confidence: 99%
“…The Eqs. (15) and (16) hold owing to A Rule of Key Freshness ⟨I R6 , I R7 ⟩ and BAN Logic Assumption ⟨A⟩ 4 . To achieve the Eq.…”
Section: Security Goalsmentioning
confidence: 99%
“…In the S-USI scheme, three message rounds are considered such as M sg1 = ⟨P 1 , P 2 , TS 1 ⟩ , M sg2 = ⟨Q 1 , Q 2 , TS 2 ⟩ and ⟨R, H⟩ to transmit between U ser and R S . Thus, the total communication cost of the proposed S-USI scheme is carefully computed: ⟨320 + 320 + 160 + 160⟩ = 960 bits in comparison with other existing authentication schemes (16) and…”
Section: Comparison Of Communication and Storage Costmentioning
confidence: 99%
“…Generally speaking, the application should obtain a reliable transmission region to gain network access of the service provider. It has different users with distinct identities/secret key pairs to gain the exclusive rights of resource usage [16]. Figure 1 shows the electronic healthcare architecture using a CoMT.…”
Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems.
“…Traceability The existing authentication protocols [16,19,20] cannot offer a reliable feature of traceability as the pseudo-identities are known to the communication network. However, the proposed S-USI can compute the real identities of client/server to protect the pseudonym identities when M d ∕M s derives the anonymity function using key = PRF S k (H(I d )) ⊕ H � (S k 0 ) .…”
Section: Resilient To Replay Attackmentioning
confidence: 99%
“…The Eqs. (15) and (16) hold owing to A Rule of Key Freshness ⟨I R6 , I R7 ⟩ and BAN Logic Assumption ⟨A⟩ 4 . To achieve the Eq.…”
Section: Security Goalsmentioning
confidence: 99%
“…In the S-USI scheme, three message rounds are considered such as M sg1 = ⟨P 1 , P 2 , TS 1 ⟩ , M sg2 = ⟨Q 1 , Q 2 , TS 2 ⟩ and ⟨R, H⟩ to transmit between U ser and R S . Thus, the total communication cost of the proposed S-USI scheme is carefully computed: ⟨320 + 320 + 160 + 160⟩ = 960 bits in comparison with other existing authentication schemes (16) and…”
Section: Comparison Of Communication and Storage Costmentioning
confidence: 99%
“…Generally speaking, the application should obtain a reliable transmission region to gain network access of the service provider. It has different users with distinct identities/secret key pairs to gain the exclusive rights of resource usage [16]. Figure 1 shows the electronic healthcare architecture using a CoMT.…”
Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems.
“…As calculated or suggested by authors in References 25,26, the computation complexity of the operations can be defined as (Elliptic Curve Cryptography(ECC) ≫ Private key cryptography > Hash). In Table 2, we calculated the computation cost for NHC, 7 CLUSS 9 protocol, and the proposed protocol.…”
Summary
In an underwater environment, wireless sensor networks (WSNs) have more potential applications such as homeland safety, naval surveillance, and pollution & exploration monitoring. Underwater wireless sensor networks (UWSNs) help in decreasing the rate of causalities and provide efficient ways for monitoring the underwater activities of the other countries. UWSNs can be efficiently used by the navy to monitor suspicious activities and also to counter‐attack any terrorist or enemy attacks. As usual, deploying wireless sensor networks underwater is not only challenging due to environment and constrained resources but also is vulnerable to security attacks. Thus, security is an unexplored and crucial aspect of UWSNs. Here, we define a node authentication mechanism for UWSNs for securing frontier lines, maritime territory, and naval surveillance. The proposed authentication protocol is based on symmetric‐key cryptography and secures against impersonation, masquerade, Sybil, and many more other attacks. We have analyzed the proposed protocol both formally and automatedly and were unable to find any possible security attack on the proposed protocol. The experimental analysis of the mechanism proved that the proposed mechanism consumes less energy compared to the existing mechanisms. Hence, the proposed mechanism can be easily adopted for maintaining the security of maritime territory and reduce the causalities in naval operations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.