User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context
Abstract
Recently, the numerous academic papers have been published on Authentication and Key Agreement (AKA) schemes for securing wireless sensor networks (WSN) in the context of the Internet of Things (IoT). The goal of these schemes is to protect external users’ access to data collected by WSNs . Due to limited resources and the wireless communication medium, the sensor nodes are vulnerable to multiple attacks performed by malicious user’s. Unfortunately, most of the proposed schemes are insecure and require higher storage, communication and computing costs. This paper presents a User Authentication protocol to secure WSNs Access in the IoT context (UAWSNAIoT). The BAN-Logic and Real-Or-Random (ROR) models are used to demonstrate the reliability of UAWSNA-IoT in meeting all requirements for mutual authentication and session key security, respectively. In addition, UAWSNA-IoT offers high security with low computational, storage and communication overhead, making it an ideal choice for resource-constrained IoT devices such as WSNs.
Keywords
Internet of Things, Wireless Sensor Networks, mutual authentication, Authentication and Key Agreement, User Authentication, Session Key, BAN-Logic, ROR modelThis work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
B. Mostefa, G. Abdelkader and B. Mohamed, "User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context," in Journal of Communications Software and Systems, vol. 20, no. 2, pp. 186-197, May 2024, doi: https://doi.org/10.24138/jcomss-2023-0068
@article{mostefa2024userauthentication, author = {Benfilali Mostefa and Gafour Abdelkader and Belghachi Mohamed}, title = {User-Authentication Protocol to Secure Wireless Sensor Network Access in the Internet of Things Context}, journal = {Journal of Communications Software and Systems}, month = {5}, year = {2024}, volume = {20}, number = {2}, pages = {186--197}, doi = {https://doi.org/10.24138/jcomss-2023-0068}, url = {https://doi.org/https://doi.org/10.24138/jcomss-2023-0068} }