Abstract

Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN having constraints of energy consumption, coverage, connectivity, and security. However, security and privacy is one of the major challenges in IWSN as the nodes are connected to Internet and usually located in an unattended environment with minimum human interventions. In IWSN, there is a fundamental requirement for a user to access the real-time information directly from the designated sensor nodes. This task demands to have a user authentication protocol. To satisfy this requirement, this paper proposes a lightweight and privacy-preserving mutual user authentication protocol in which only the user with a trusted device has the right to access the IWSN. Therefore, in the proposed scheme, we considered the physical layer security of the sensor nodes. We show that the proposed scheme ensures security even if a sensor node is captured by an adversary. The proposed protocol uses the lightweight cryptographic primitives, such as one way cryptographic hash function, physically unclonable function, and bitwise exclusive operations. Security and performance analysis shows that the proposed scheme is secure, and is efficient for the resource-constrained sensing devices in IWSN.

Highlights

  • The Industrial Wireless Sensor Network (IWSN) value proposition has evolved from extending or replacing wired networks to cloud-connected smart object intelligence

  • Since the sensor nodes in IWSN have limited computational and storage capabilities, a lightweight authentication and key agreement protocol is preferred in such a network

  • In order to access the real-time information directly from some designated sensor nodes in IWSNs, a user first needs to be authenticated by the gateway

Read more

Summary

INTRODUCTION

The Industrial Wireless Sensor Network (IWSN) value proposition has evolved from extending or replacing wired networks to cloud-connected smart object intelligence. Today’s sensor networks can provide remote interaction with the outside physical world This proliferation of WSNs has enabled several new classes of applications that benefit a large number of applications [1]. In IWSNs, the collaborative nature allows many potential advantages over traditional wired industrial monitoring as well as control systems, such as self-organization, flexibility, rapid deployment and inherent intelligent-processing capability [21]. It is argued that in order to realize the visualized industrial applications and effective communication protocols, we require the advantages potential gains of WSN [21]. Growing security concern for automation industry coupled with increasing adoption of sensor networks in order to monitor various processes spurs the demand of IWSNs. On the contrary, availability of multiple wireless communication standards is expected to have an adverse impact on IWSNs market. The technological advancements in wireless communication and energy consumption without losing accuracy are some of the factors that may disclose new avenues for IWSN market in the near future

Related Work
Motivation
Research Contributions
Paper Outline
System Model
Adversary Model
Evaluation Criteria
THE PROPOSED SCHEME
Assumptions for the Proposed Scheme
Phase I
Phase II
Phase III
Phase IV
SECURITY ANALYSIS OF THE PROPOSED SCHEME
Security Model
Formal Security Analysis
Informal Security Analysis
PERFORMANCE ANALYSIS AND COMPARISON
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call