Abstract

Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor nodes, different types of controls, and gateway nodes. these kinds of networks are used as control systems and remote monitoring in industries such as health care, defense, agriculture, and disaster management. Due to the widespread use of wireless sensor networks, valuable information is exchanged between network entities such as sensors, gates, users, etc. in an unsafe channel, and the presence of important and sensitive information in the network increases the importance of security issues. In this article, we analyzed Majid Alotaibi schema and identify some security breaches in this article. We have also described a security attack against the proposed protocol based on security problems. In addition, to address the security issues of M. Alotaibi proposed protocol, we have introduced a mutual authentication and key agreement protocol based on ECDH (elliptic-curve Diffie-Hellman). We have implemented our own method using the Scyther tool, manually reviewed its security features and also compared it with other methods.

Highlights

  • Wireless Sensor Networks (WSN) is one of the emerging technologies of the century and is becoming an epidemic technology [1]

  • A variety of advances have been made in the field of wireless communication and electronic science that enable the development of low-power, low-cost and performance sensor nodes

  • The wireless sensor network consists of a large number of sensor nodes that are randomly deployed to connect through the wireless environment to monitor physical or environmental conditions such as noise, vibration, pressure, temperature, etc

Read more

Summary

INTRODUCTION

Wireless Sensor Networks (WSN) is one of the emerging technologies of the century and is becoming an epidemic technology [1]. A variety of advances have been made in the field of wireless communication and electronic science that enable the development of low-power, low-cost and performance sensor nodes. In wireless sensor structure because of resource limitation constructions, it bears several security threats, such as hardware manipulation, eavesdropping, injecting false messages, etc., more efficient security mechanisms that conform to specific WSN features, are transmitted to the network. In such security mechanisms, when two nodes want to communicate with each other, they use a common key for the encryption and decryption process This symmetric key has already been selected and shared by the nodes to provide message security and authentication.

RELATED WORK
PERFECT FORWARD SECRECY
USER AND GWN REGISTRATION PHASE
OFFICIAL SECURITY PROOF WITH SCYTHER
SECURE AGAINST OFFLINE PASSWORD GUESSING ATTACKS
SECURE AGAINST MAN-IN-THE-MIDDLE ATTACKS
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call