Please use this identifier to cite or link to this item:
http://103.65.197.75:8080/jspui/handle/123456789/309
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Maurya, Anup Kumar | - |
dc.date.accessioned | 2024-11-18T09:43:04Z | - |
dc.date.available | 2024-11-18T09:43:04Z | - |
dc.date.issued | 2021 | - |
dc.identifier.issn | 1383-7621 | - |
dc.identifier.uri | http://103.65.197.75:8080/jspui/handle/123456789/309 | - |
dc.description.abstract | In this article, we propose an efficient Bloom filter and fuzzy extractor based user authentication technique, which is significant for an Internet of Things (IoT)-enabled multi-hop Wireless Sensor Networks (IoT-WSNs). The novelty of the proposed authentication technique is that it prevents fraudulent querying data delivery at the starting phase (i.e., at the querying sensor node itself) to stop false or counterfeit data flooding (which can exhaust the resources of IoT-WSNs) from the resource-constrained IoT-enabled sensor nodes to the nearby gateway node. The proposed authentication technique has the ability to significantly reduce the Bloom filter based false positive for user authentication in IoT-WSNs, while also preserving the constraint resources of WSNs. To estimate the security robustness of the proposed protocol based on the security goals of IoT-WSNs, we perform the formal security analysis using the random oracle and Real-Or-Random (ROR) models, informal security analysis and also the formal security verification using a widely-recognized automated software validation tool, known as Automated Validation of Internet Security Protocols and Applications (AVISPA). Next, communication and computational overheads analysis reveal that the proposed protocol is appropriate for resource-constrained sensor nodes. Furthermore, a correlative security feature and complexity analysis outcomes validate that the proposed protocol is reliable, secure, and efficient in comparison with other existing state of art related user authentication protocols. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.subject | Wireless Sensor Networks (WSNs) Internet of Things (IoT) Bloom filter Fuzzy extractor User authentication Security | en_US |
dc.title | Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Anup -Secure user authentication mechanism.pdf Restricted Access | 2.7 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.