An AODV Based Multifactor Authentication Scheme for Wireless Sensor Network
DOI:
https://doi.org/10.33736/jita.3840.2021Keywords:
high, authentication overhead, lightweight, lower computational cost, malicious attack, multi-factor authenticationAbstract
Wireless Sensor Network (WSN) is a type of wireless network that is fast getting a lot of attention in scientific and industrial applications, and it is a network of decentralized autonomous standalone sensor devices. However, WSN is easily prone to malicious attacks as anyone can access the server through the node without a proper security authentication. In this paper, we proposed a secure AODV based multi-factor authentication scheme for WSN to mitigate physical attack, offline guessing attack and replay attack. Our proposed scheme is preferred to keep the scheme lightweight while providing enough security that requires smart card, user identity, password, and OTP. Our proposed scheme has relatively lower computational cost with a total of 10Th than the other compared schemes except for Adil et al.’s scheme. However, we have around 8288 bits of authentication overhead due to the nature of packet and the addition of factors. Hence, our scheme is outperformed from computational cost perspective, but the scheme is slightly higher on authentication overhead perspective. In the future, multiple device authentication, implementation of biometric feature can be added to improve the scheme.
References
[2] M. Iliyas Ahmad, Y. Yusof, A. Adam and M. Daud, "Machine Process Condition Monitoring with 3MP", 2019 4th International Conference on Electromechanical Control Technology and Transportation (ICECTT), 2019.
[3] B. Zhou, S. Li, W. Wang, J. Wang, Y. Cheng and J. Wu, "An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs", IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9738-9747, 2019.
[4] S. Durugkar and R. Poonia, "Optimum utilization of natural resources for home garden using wireless sensor networks", Journal of Information and Optimization Sciences, vol. 38, no. 6, pp. 1077-1085, 2017.
[5] A. Ezhilazhahi and P. Bhuvaneswari, "IoT enabled plant soil moisture monitoring using wireless sensor networks", 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS), 2017.
[6] W. Nooriman, A. Abdullah, N. Rahim and K. Kamarudin, "Development of wireless sensor network for Harumanis Mango orchard's temperature, humidity and soil moisture monitoring", 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2018.
[7] B. Guanochanga et al., "Real-Time Air Pollution Monitoring Systems Using Wireless Sensor Networks Connected in a Cloud-Computing, Wrapped up Web Services", Proceedings of the Future Technologies Conference (FTC) 2018, pp. 171-184, 2018.
[8] P. Gope, A. Das, N. Kumar and Y. Cheng, "Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks", IEEE Transactions on Industrial Informatics, vol. 15, no. 9, pp. 4957-4968, 2019.
[9] K. Ferentinos, N. Katsoulas, A. Tzounis, T. Bartzanas and C. Kittas, "Wireless sensor networks for greenhouse climate and plant condition assessment", Biosystems Engineering, vol. 153, pp. 70-81, 2017.
[10] M. Chen, T. Lee and J. Pan, "An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring", Sensors, vol. 19, no. 5, p. 1146, 2019.
[11] X. Li, J. Niu, M. Bhuiyan, F. Wu, M. Karuppiah and S. Kumari, "A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things", IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3599-3609, 2018.
[12] M. Adil et al., "MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks", IEEE Access, vol. 8, pp. 44459-44469, 2020.
[13] S. Shin and T. Kwon, "Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks", IEEE Access, vol. 6, pp. 11229-11241, 2018.
[14] G. Xu, F. Wang, M. Zhang and J. Peng, "Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks", IEEE Access, vol. 8, pp. 47282-47294, 2020.
[15] M. ONIK, C. KIM and J. YANG, "Personal Data Privacy Challenges of the Fourth Industrial Revolution", 2019 21st International Conference on Advanced Communication Technology (ICACT), 2019.
[16] M. Moghadam, M. Nikooghadam, M. Jabban, M. Alishahi, L. Mortazavi and A. Mohajerzadeh, "An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network", IEEE Access, vol. 8, pp. 73182-73192, 2020.
[17] S. Yu, J. Lee, K. Park, A. Das and Y. Park, "IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment", IEEE Access, vol. 8, pp. 167875-167886, 2020.
[18] S. Ahmed, S. Kumari, M. Saleem, K. Agarwal, K. Mahmood and M. Yang, "Anonymous Key-Agreement Protocol for V2G Environment Within Social Internet of Vehicles", IEEE Access, vol. 8, pp. 119829-119839, 2020.
[19] M. Umar, Z. Wu and X. Liao, "Mutual Authentication in Body Area Networks Using Signal Propagation Characteristics", IEEE Access, vol. 8, pp. 66411-66422, 2020.
[20] M. Masud et al., "A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care", IEEE Internet of Things Journal, pp. 1-1, 2021.
[21] R. Desai, B. Patil and D. Sharma, "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis", Indonesian Journal of Electrical Engineering and Computer Science, vol. 7, no. 3, pp. 795-801, 2017.
[22] R. Rana and R. Kumar, "Performance Analysis of AODV in Presence of Malicious Node", Acta Electronica Malaysia, vol. 3, no. 1, pp. 01-05, 2019
[23] A. Phimphinith, X. Anping, Q. Zhu, Y. Jiang and Y. Shen, "An Enhanced Mutual Authentication Scheme Based on ECDH for IoT Devices Using ESP8266", 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), 2019.
[24] Choi, D. Kim, J. Choe and K. Shin, "Hardware Implementation of ECIES Protocol on Security SoC", 2020 International Conference on Electronics, Information, and Communication (ICEIC), 2020.
[25] P. Gope, A. Das, N. Kumar and Y. Cheng, "Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks", IEEE Transactions on Industrial Informatics, vol. 15, no. 9, pp. 4957-4968, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright Transfer Statement for Journal
1) In signing this statement, the author(s) grant UNIMAS Publisher an exclusive license to publish their original research papers. The author(s) also grant UNIMAS Publisher permission to reproduce, recreate, translate, extract or summarize, and to distribute and display in any forms, formats, and media. The author(s) can reuse their papers in their future printed work without first requiring permission from UNIMAS Publisher, provided that the author(s) acknowledge and reference publication in the Journal.
2) For open access articles, the author(s) agree that their articles published under UNIMAS Publisher are distributed under the terms of the CC-BY-NC-SA (Creative Commons Attribution-Non Commercial-Share Alike 4.0 International License) which permits unrestricted use, distribution, and reproduction in any medium, for non-commercial purposes, provided the original work of the author(s) is properly cited.
3) For subscription articles, the author(s) agree that UNIMAS Publisher holds copyright, or an exclusive license to publish. Readers or users may view, download, print, and copy the content, for academic purposes, subject to the following conditions of use: (a) any reuse of materials is subject to permission from UNIMAS Publisher; (b) archived materials may only be used for academic research; (c) archived materials may not be used for commercial purposes, which include but not limited to monetary compensation by means of sale, resale, license, transfer of copyright, loan, etc.; and (d) archived materials may not be re-published in any part, either in print or online.
4) The author(s) is/are responsible to ensure his or her or their submitted work is original and does not infringe any existing copyright, trademark, patent, statutory right, or propriety right of others. Corresponding author(s) has (have) obtained permission from all co-authors prior to submission to the journal. Upon submission of the manuscript, the author(s) agree that no similar work has been or will be submitted or published elsewhere in any language. If submitted manuscript includes materials from others, the authors have obtained the permission from the copyright owners.
5) In signing this statement, the author(s) declare(s) that the researches in which they have conducted are in compliance with the current laws of the respective country and UNIMAS Journal Publication Ethics Policy. Any experimentation or research involving human or the use of animal samples must obtain approval from Human or Animal Ethics Committee in their respective institutions. The author(s) agree and understand that UNIMAS Publisher is not responsible for any compensational claims or failure caused by the author(s) in fulfilling the above-mentioned requirements. The author(s) must accept the responsibility for releasing their materials upon request by Chief Editor or UNIMAS Publisher.
6) The author(s) should have participated sufficiently in the work and ensured the appropriateness of the content of the article. The author(s) should also agree that he or she has no commercial attachments (e.g. patent or license arrangement, equity interest, consultancies, etc.) that might pose any conflict of interest with the submitted manuscript. The author(s) also agree to make any relevant materials and data available upon request by the editor or UNIMAS Publisher.