Abstract

Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critical). Moreover, due to open nature of communication channel and resource constrained environment of nodes the privacy, integrity and confidentiality of the data becomes a big issue as we need to ensure that the said data is only accessed by a valid user in the IIOT environment. Many schemes presented various means to overcome the above issue. However, the existing works do have certain vulnerabilities which make its application in the WSNs constrained. The proposed work presents a scheme for achieving above goals in IIOT environment. Moreover, the proposed scheme presents security vulnerabilities and weaknesses in existing schemes and attempts to overcome these issues; the proposed work provides cryptanalysis of Xiong et al. scheme which is based on ECC, the direct consequence of the cryptanalysis directs to design a solution which can overcome the issues. The proposed work provides a robust hash based conditional privacy preserving authentication and probabilistic key exchange protocol which is lightweight and as a result, puts less computation overheads on the entities involved in the region. The proposed work is secure against many known attacks due to difficulty in guessing the credentials. The main motivation is to develop a lightweight scheme which can help exchange information with efficacy. The security of the proposed work is provided using both formal and informal security analysis where formal analysis comprises of AVISPA and Real-or-Random oracle model simulations whereas informal analysis depicts proofs as of how the proposed work withstands many known attacks. Thus, the proposed work is secure against many malicious attacks directing and championing its application in IIOT environment.

Highlights

  • The rapid growth of micro-electromechanical system and Wireless Sensor Networks (WSNs) is due to heavy application of them in our everyday life in resource constrained and hostile environments supporting realtime application in healthcare, military surveillance, wildlife monitoring, intelligent transportation, vehicular tracking and environment control to name few

  • A WSN is formed with the help of a gateway node and other sensor nodes where each specific sensor node collects a data from a region, and the attained data is forwarded to the gateway node over the communication channel where the gateway node is presumed to be possessing high computational abilities as to meet the demands

  • Nam et al [2] presented a authentication protocol depending on ECC which presented a provably secure scheme but the said work is vulnerable as it lacks password change phase, wrong password detection [6], KSSTI attack, suppress replay attack and fails to provide sensor node anonymity

Read more

Summary

INTRODUCTION

The rapid growth of micro-electromechanical system and Wireless Sensor Networks (WSNs) is due to heavy application of them in our everyday life in resource constrained and hostile environments (for instance places where wired networks cannot be deployed, such as forests) supporting realtime application in healthcare, military surveillance, wildlife monitoring, intelligent transportation, vehicular tracking and environment control to name few. 4) Replay Attack: The gateway node GW , sensor node SN and user U should have the capability to detect the freshness of the message and reject the message which are not fresh In this attack an adversary tries to impersonate the either of given entity by sending the previous message or replaying the legitimate message from one of the previous sessions in this session. 8) Identity Compromise Impersonation Attack: In this attack if the identity of either gateway node GW , user U and sensor node SN is compromised or exposed, the knowledge of this should not help an adversary exceed it’s a-priori knowledge to cause disruptions in the system such as impersonation, modification, replay, attaining session key, etc. The section below depicts the related works and several weaknesses the related works possess

RELATED WORKS
AUTHENTICATION AND KEY-AGREEMENT PHASE
3: The mobile device of user
PROPOSED SCHEME
PASSWORD CHANGE PHASE
AUTHENTICATION PROOF USING BAN LOGIC
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call