Home > Research > Publications & Outputs > An authentication protocol for future sensor ne...

Text available via DOI:

View graph of relations

An authentication protocol for future sensor networks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

An authentication protocol for future sensor networks. / Bilal, Muhammad; Kang, Shin Gak.
In: Sensors (Switzerland), Vol. 17, No. 5, 979, 28.04.2017.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Bilal, M & Kang, SG 2017, 'An authentication protocol for future sensor networks', Sensors (Switzerland), vol. 17, no. 5, 979. https://doi.org/10.3390/s17050979

APA

Bilal, M., & Kang, S. G. (2017). An authentication protocol for future sensor networks. Sensors (Switzerland), 17(5), Article 979. https://doi.org/10.3390/s17050979

Vancouver

Bilal M, Kang SG. An authentication protocol for future sensor networks. Sensors (Switzerland). 2017 Apr 28;17(5):979. doi: 10.3390/s17050979

Author

Bilal, Muhammad ; Kang, Shin Gak. / An authentication protocol for future sensor networks. In: Sensors (Switzerland). 2017 ; Vol. 17, No. 5.

Bibtex

@article{80d211552ce1496ba304c2a9a62edf39,
title = "An authentication protocol for future sensor networks",
abstract = "Authentication is one of the essential security services inWireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements, for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.",
keywords = "Authentication, BAN logic, Key distribution, Network security, Privacy, Sensor networks",
author = "Muhammad Bilal and Kang, {Shin Gak}",
year = "2017",
month = apr,
day = "28",
doi = "10.3390/s17050979",
language = "English",
volume = "17",
journal = "Sensors (Switzerland)",
issn = "1424-8220",
publisher = "NLM (Medline)",
number = "5",

}

RIS

TY - JOUR

T1 - An authentication protocol for future sensor networks

AU - Bilal, Muhammad

AU - Kang, Shin Gak

PY - 2017/4/28

Y1 - 2017/4/28

N2 - Authentication is one of the essential security services inWireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements, for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.

AB - Authentication is one of the essential security services inWireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements, for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.

KW - Authentication

KW - BAN logic

KW - Key distribution

KW - Network security

KW - Privacy

KW - Sensor networks

UR - http://www.scopus.com/inward/record.url?scp=85018326534&partnerID=8YFLogxK

U2 - 10.3390/s17050979

DO - 10.3390/s17050979

M3 - Journal article

C2 - 28452937

AN - SCOPUS:85018326534

VL - 17

JO - Sensors (Switzerland)

JF - Sensors (Switzerland)

SN - 1424-8220

IS - 5

M1 - 979

ER -