Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks

Wireless networks have continued to evolve to offer connectivity between users and smart devices such as drones and wireless sensor nodes. In this environment, insecure public channels are deployed to link the users to their remote smart devices. Some of the application areas of these smart devices include military surveillance and healthcare monitoring. Since the data collected and transmitted to the users are highly sensitive and private, any leakages can have adverse effects. As such, strong entity authentication should be implemented before any access is granted in these wireless networks. Although numerous protocols have been developed for this purpose, the simultaneous attainment of robust security and privacy at low latencies, execution time and bandwidth remains a mirage. In this paper, a session-dependent token-based payload enciphering scheme for integrity enhancements in wireless networks is presented. This protocol amalgamates fuzzy extraction with extended Chebyshev chaotic maps to boost the integrity of the exchanged payload. The security analysis shows that this scheme offers entity anonymity and backward and forward key secrecy. In addition, it is demonstrated to be robust against secret ephemeral leakage, side-channeling, man-in-the-middle and impersonation attacks, among other security threats. From the performance perspective, the proposed scheme requires the least communication overheads and a relatively low execution time during the authentication process.

[1]  V. O. Nyangaresi,et al.  Efficient Authentication Algorithm for Secure Remote Access in Wireless Sensor Networks , 2021, Journal of Computer Science Research.

[2]  V. O. Nyangaresi,et al.  Certificate Based Authentication Scheme for Smart Homes , 2021, 2021 3rd Global Power, Energy and Communication Conference (GPECOM).

[3]  Vincent Omollo Nyangaresi,et al.  Lightweight Key Agreement and Authentication Protocol for Smart Homes , 2021, 2021 IEEE AFRICON.

[4]  V. O. Nyangaresi ECC Based Authentication Scheme for Smart Homes , 2021, 2021 International Symposium ELMAR.

[5]  Vincent Omollo Nyangaresi,et al.  Mutual Authentication Protocol for Secure VANET Data Exchanges , 2021, FABULOUS.

[6]  Neeraj Kumar,et al.  A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion , 2020, IEEE Systems Journal.

[7]  V. O. Nyangaresi Hardware Assisted Protocol for Attacks Prevention in Ad Hoc Networks , 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

[8]  Silvance O. Abeka,et al.  Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications , 2020, 2020 16th International Computer Engineering Conference (ICENCO).

[9]  Joel J. P. C. Rodrigues,et al.  Cloud Centric Authentication for Wearable Healthcare Monitoring System , 2019, IEEE Transactions on Dependable and Secure Computing.

[10]  Taekyoung Kwon,et al.  A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things , 2020, IEEE Access.

[11]  Georges Kaddoum,et al.  A Collaborative Security Framework for Software-Defined Wireless Sensor Networks , 2020, IEEE Transactions on Information Forensics and Security.

[12]  Devender Kumar,et al.  A secure three-factor authentication scheme for wireless sensor networks using ECC , 2020, Journal of Discrete Mathematical Sciences and Cryptography.

[13]  Dariush Abbasinezhad-Mood,et al.  Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..

[14]  Guoai Xu,et al.  A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map , 2019, IEEE Access.

[15]  Ying Chen,et al.  An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks , 2019, IEEE Access.

[16]  Maede Ashouri-Talouki,et al.  Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks , 2019, Peer-to-Peer Netw. Appl..

[17]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[18]  Shahid Mumtaz,et al.  Energy Prediction Based MAC Layer Optimization for Harvesting Enabled WSNs in Smart Cities , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[19]  Sedat Akleylek,et al.  A survey on security threats and authentication approaches in wireless sensor networks , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).

[20]  Dariush Abbasinezhad-Mood,et al.  Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps , 2018, IEEE Transactions on Industrial Informatics.

[21]  Mauro Conti,et al.  A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..

[22]  Xiong Li,et al.  An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..

[23]  Chenyu Wang,et al.  An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks , 2017, Sensors.

[24]  V. N. Sastry,et al.  Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things , 2017, Inf..

[25]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[26]  Yi Xie,et al.  An Optimization Scheme of Enhanced Adaptive Dynamic Energy Consumption Based on Joint Network-Channel Coding in WSNs , 2017, IEEE Sensors Journal.

[27]  Sherali Zeadally,et al.  Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.

[28]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[29]  Xiong Li,et al.  A new and secure authentication scheme for wireless sensor networks with formal proof , 2017, Peer-to-Peer Netw. Appl..

[30]  YoHan Park,et al.  Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks , 2016, Sensors.

[31]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[32]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[33]  Yang Yu,et al.  A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.

[34]  Yang Yu,et al.  A Hybrid Methodologies for Intrusion Detection Based Deep Neural Network with Support Vector Machine and Clustering Technique , 2016 .

[35]  Muhammad Khurram Khan,et al.  Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.

[36]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[37]  Mubashir Husain Rehmani,et al.  Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..

[38]  Ashok Kumar Das,et al.  A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..

[39]  Xiong Li,et al.  An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.

[40]  Jianfeng Ma,et al.  An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..

[41]  Victor C. M. Leung,et al.  Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integratedwith Mobile Cloud Computing , 2015, IEEE Transactions on Computers.

[42]  Ashok Kumar Das,et al.  A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[43]  Chin-Ling Chen,et al.  A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks , 2015, J. Sensors.

[44]  Rajamanickam Murugesan,et al.  A node authentication clustering based security for ADHOC network , 2014, 2014 International Conference on Communication and Signal Processing.

[45]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[46]  Fagen Li,et al.  Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.