dc.contributor.author | Ghani, Anwar | |
dc.contributor.author | Mansoor, Khwaja | |
dc.contributor.author | Mehmood, Shahid | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.contributor.author | Rahman, Arif Ur | |
dc.contributor.author | Saqib, Malik Najmus | |
dc.date.accessioned | 2019-09-30T18:35:23Z | |
dc.date.available | 2019-09-30T18:35:23Z | |
dc.date.issued | 2019 | en_US |
dc.identifier.issn | 1074-5351 | |
dc.identifier.issn | 1099-1131 | |
dc.identifier.uri | https://hdl.handle.net/11363/1467 | |
dc.description.abstract | Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource-limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key-based authentication protocol for IoT-based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA | en_US |
dc.relation.isversionof | 10.1002/dac.4139 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | authentication protocol | en_US |
dc.subject | IoT | en_US |
dc.subject | key agreement | en_US |
dc.subject | symmetric encryption | en_US |
dc.subject | WSN | en_US |
dc.subject | BODY AREA NETWORKS | en_US |
dc.subject | MUTUAL AUTHENTICATION | en_US |
dc.subject | USER AUTHENTICATION | en_US |
dc.subject | AGREEMENT SCHEME | en_US |
dc.subject | EFFICIENT | en_US |
dc.subject | INTERNET | en_US |
dc.title | Security and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric Key | en_US |
dc.type | article | en_US |
dc.relation.ispartof | INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |