Preview

Scientific and Technical Journal of Information Technologies, Mechanics and Optics

Advanced search

Lightweight ECC and token based authentication mechanism for WSN-IoT

https://doi.org/10.17586/2226-1494-2022-22-2-332-338

Abstract

The paper deals with Wireless Sensor Networks (WSN) registered in a specific Internet of Things (IoTʼs) network that have different kind of applications. They come into use once they are successfully registered within a specific IoT network. Elliptic Curve Cryptography (ECC) with Token based Security Scheme is proposed here for secured and authenticated communication. A lightweight authentication mechanism is proposed also in order to prevent the network from the unauthorized access. Network nodes are generated with token keys immediately after login, and the gateway generates token ID for each individual nodes. Then elliptical curve cryptography is applied to remove the malicious nodes completely if some adversaries missed out during token key verification process. If the user needs to access the data, he must go through the token key generation and verification phase, as well as through the data integrity and transmission phase.

About the Authors

L. Sasirega
Vels Institute of Science Technology & Advanced Studies
India

Loganathan Sasirega — PhD, Research Scholar 

Chennai, 600117 

 sc 57414859000 



C. Shanthi
Vels Institute of Science Technology & Advanced Studies (VISTAS)
India

Chandrabose Shanthi — PhD, Assistant Professor 

Chennai, 600117 

 sc 57195615646 



References

1. Zhang Q., Fu S., Jia N., Xu M. A verifiable and dynamic multikeyword ranked search scheme over encrypted cloud data with accuracy improvement // Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. 2018. V. 254. P. 588–604. https://doi.org/10.1007/978-3-030-01701-9_32

2. Shen J., Shen J., Chen X., Huang X., Susilo W. An efficient public auditing protocol with novel dynamic structure for cloud data // IEEE Transactions on Information Forensics and Security. 2017. V. 12. N 10. P. 2402–2415. https://doi.org/10.1109/TIFS.2017.2705620

3. Han G., Wang H., Miao X., Liu L., Jiang J., Peng Y. A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT // IEEE Transactions on Industrial Informatics. 2020. V. 16. N 8. P. 5527–5538. https://doi.org/10.1109/TII.2019.2953937

4. Far H.A.N., Bayat M., Das A.K., Fotouhi M., Pournaghi S.M., Doostari M.A. LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT // Wireless Networks. 2021. V. 27. N 2. P. 1389–1412. https://doi.org/10.1007/s11276-020-02523-9

5. Al-Turjman F., Alturjman S. Context-sensitive access in industrial internet of things (IIoT) healthcare applications // IEEE Transactions on Industrial Informatics. 2018. V. 14. N 6. P. 2736–2744. https://doi.org/10.1109/TII.2018.2808190

6. Stallings W. Cryptography and Network Security: Principles and Practice. 5th ed. Pearson Education, 2013.

7. Verma D., Jain R., Shrivastava A. Performance analysis of cryptographic algorithms RSA and ECC in wireless sensor networks // IUP Journal of Telecommunications. 2015. V. 7. N 3. P. 15.

8. Ahmed M.H., Alam S.W., Qureshi N., Baig I. Security for WSN based on elliptic curve cryptography // Proc. of the 1st International Conference on Computer Networks and Information Technology (ICCNIT). 2011. P. 75–79. https://doi.org/10.1109/ ICCNIT.2011.6020911

9. He D., Chan S., Tang S., Guizani M. Secure data discovery and dissemination based on hash tree for wireless sensor networks // IEEE Transactions on Wireless Communications. 2013. V. 12. N 9. P. 4638– 4646. https://doi.org/10.1109/TWC.2013.090413.130072

10. Jawad K., Mansoor K., Baig A.F., Ghani A., Naseem A. An improved three-factor anonymous authentication protocol for WSN s based iot system using symmetric cryptography // Proc. of the 2019 International Conference on Communication Technologies (ComTe ch). 2019. P. 53–59. https://doi.org/10.1109/COMTECH.2019.8737799

11. Kandi M.A., Lakhlef H., Bouabdallah A., Challal Y. An efficient multi-group key management protocol for Internet of Things // Proc. of the 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). 2018. P. 438–443. https://doi.org/10.23919/SOFTCOM.2018.8555857

12. Zhou G.-D., Yi T.-H. Recent developments on wireless sensor networks technology for bridge health monitoring // Mathematical Problems in Engineering. 2013. V. 2013. P. 947867. https://doi.org/10.1155/2013/947867

13. Bhawiyuga A., Data M., Warda A. Architectural design of token based authentication of MQTT protocol in constrained IoT device // Proc. of the 11th International Conference on Telecommunication Systems Services and Applications (TSSA). 2017. P. 1–4. https://doi. org/10.1109/TSSA.2017.8272933

14. Dammak M., Boudia O.R.M., Messous M.A., Senouci S.M., Gransart C. Token-based lightweight authentication to secure IoT networks // Proc. of the 16th IEEE Annual Consumer Communications and Networking Conference (CCNC). 2019. P. 8651825. https://doi.org/10.1109/CCNC.2019.8651825

15. Li X., Niu J., Bhuiyan M.Z.A., Wu F., Karuppiah M., Kumari S. A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things // IEEE Transactions on Industrial Informatics. 2018. V. 14. N 8. P. 3599– 3609. https://doi.org/10.1109/TII.2017.2773666

16. Kung Y.-H., Hsiao H.-C. GroupIt: Lightweight group key management for dynamic IoT environments // IEEE Internet of Things Journal. 2018. V. 5. N 6. P. 5155–5165. https://doi.org/10.1109/JIOT.2018.2840321

17. Mughal M.A., Shi P., Ullah A., Mahmood K., Abid M., Luo X. Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN // IEEE Access. 2019. V. 7. P. 76699– 76711. https://doi.org/10.1109/ACCESS.2019.2921999


Review

For citations:


Sasirega L., Shanthi C. Lightweight ECC and token based authentication mechanism for WSN-IoT. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2022;22(2):332-338. https://doi.org/10.17586/2226-1494-2022-22-2-332-338

Views: 9


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2226-1494 (Print)
ISSN 2500-0373 (Online)