一种高效的基于ECC和模糊验证器的用户认证协议,用于支持物联网的wsn。

IF 3.9 2区 综合性期刊 Q1 MULTIDISCIPLINARY SCIENCES
T Sudhakar, R Praveen, V Natarajan
{"title":"一种高效的基于ECC和模糊验证器的用户认证协议,用于支持物联网的wsn。","authors":"T Sudhakar, R Praveen, V Natarajan","doi":"10.1038/s41598-025-94550-9","DOIUrl":null,"url":null,"abstract":"<p><p>Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) are spatially distributed sensor devices that monitor physical or environmental conditions, collect data, and transmit it to a central location for analysis. Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. Numerous mutual authentication schemes have been proposed to address this challenge. Each scheme comes with its own set of advantages and drawbacks. To address the drawbacks in the prevailing schemes, this work presents a strong Two-Factor authentication (2FA) technique designed using Elliptic Curve Cryptography (ECC) and Fuzzy verifier. This approach combines the flexibility of the fuzzy verifier with the cryptographic strength of ECC to create a secure and user-friendly password authentication system to address the long-standing security-usability conflict with computational efficiency. Instead of storing a deterministic hash of the password, the system derives a fuzzy verifier password that includes randomness, makes computationally infeasible to derive. Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. The comparative analysis demonstrates that the proposed scheme achieves a computational cost of 8.9569 ms, which is significantly lower than that of existing schemes. Furthermore, security and functional requirements comparative assessment demonstrates the efficacy and feasibility of our strategy for safeguarding IoT-enabled WSN applications, rendering it a promising solution for implementation in real-world scenario with limited resources.</p>","PeriodicalId":21811,"journal":{"name":"Scientific Reports","volume":"15 1","pages":"9974"},"PeriodicalIF":3.9000,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11929806/pdf/","citationCount":"0","resultStr":"{\"title\":\"An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs.\",\"authors\":\"T Sudhakar, R Praveen, V Natarajan\",\"doi\":\"10.1038/s41598-025-94550-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) are spatially distributed sensor devices that monitor physical or environmental conditions, collect data, and transmit it to a central location for analysis. Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. Numerous mutual authentication schemes have been proposed to address this challenge. Each scheme comes with its own set of advantages and drawbacks. To address the drawbacks in the prevailing schemes, this work presents a strong Two-Factor authentication (2FA) technique designed using Elliptic Curve Cryptography (ECC) and Fuzzy verifier. This approach combines the flexibility of the fuzzy verifier with the cryptographic strength of ECC to create a secure and user-friendly password authentication system to address the long-standing security-usability conflict with computational efficiency. Instead of storing a deterministic hash of the password, the system derives a fuzzy verifier password that includes randomness, makes computationally infeasible to derive. Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. The comparative analysis demonstrates that the proposed scheme achieves a computational cost of 8.9569 ms, which is significantly lower than that of existing schemes. Furthermore, security and functional requirements comparative assessment demonstrates the efficacy and feasibility of our strategy for safeguarding IoT-enabled WSN applications, rendering it a promising solution for implementation in real-world scenario with limited resources.</p>\",\"PeriodicalId\":21811,\"journal\":{\"name\":\"Scientific Reports\",\"volume\":\"15 1\",\"pages\":\"9974\"},\"PeriodicalIF\":3.9000,\"publicationDate\":\"2025-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11929806/pdf/\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific Reports\",\"FirstCategoryId\":\"103\",\"ListUrlMain\":\"https://doi.org/10.1038/s41598-025-94550-9\",\"RegionNum\":2,\"RegionCategory\":\"综合性期刊\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"MULTIDISCIPLINARY SCIENCES\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Reports","FirstCategoryId":"103","ListUrlMain":"https://doi.org/10.1038/s41598-025-94550-9","RegionNum":2,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0

摘要

支持物联网(IoT)的无线传感器网络(wsn)是空间分布式传感器设备,用于监控物理或环境条件,收集数据并将其传输到中心位置进行分析。在开放网络中,确保数据从传感器传输到数据分析服务器时的完整性和隐私性至关重要。已经提出了许多相互身份验证方案来解决这一挑战。每种方案都有自己的优点和缺点。为了解决当前方案中的缺点,本研究提出了一种使用椭圆曲线加密(ECC)和模糊验证器设计的强双因素认证(2FA)技术。该方法将模糊验证器的灵活性与ECC的加密强度相结合,创建了一个安全且用户友好的密码认证系统,以解决长期存在的安全性-可用性与计算效率的冲突。系统不是存储密码的确定性哈希,而是派生出包含随机性的模糊验证器密码,这使得计算上无法派生。此外,该设计还解决了无线传感器网络的固有约束,例如其受约束的处理资源和对不同类型攻击的易感性。为了证实我们的方法的有效性,我们使用Real-or-Random模型正式验证了其安全性。对比分析表明,该方案的计算成本为8.9569 ms,显著低于现有方案。此外,安全性和功能需求对比评估证明了我们的策略在保护支持物联网的WSN应用方面的有效性和可行性,使其成为在资源有限的现实场景中实施的有希望的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs.

An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs.

An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs.

An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs.

Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) are spatially distributed sensor devices that monitor physical or environmental conditions, collect data, and transmit it to a central location for analysis. Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. Numerous mutual authentication schemes have been proposed to address this challenge. Each scheme comes with its own set of advantages and drawbacks. To address the drawbacks in the prevailing schemes, this work presents a strong Two-Factor authentication (2FA) technique designed using Elliptic Curve Cryptography (ECC) and Fuzzy verifier. This approach combines the flexibility of the fuzzy verifier with the cryptographic strength of ECC to create a secure and user-friendly password authentication system to address the long-standing security-usability conflict with computational efficiency. Instead of storing a deterministic hash of the password, the system derives a fuzzy verifier password that includes randomness, makes computationally infeasible to derive. Also, the design tackles the inherent constraints of WSNs, such as their constrained processing resources and susceptibility to different types of attacks. To substantiate the efficacy of our approach, we formally validate its security using the Real-or-Random model. The comparative analysis demonstrates that the proposed scheme achieves a computational cost of 8.9569 ms, which is significantly lower than that of existing schemes. Furthermore, security and functional requirements comparative assessment demonstrates the efficacy and feasibility of our strategy for safeguarding IoT-enabled WSN applications, rendering it a promising solution for implementation in real-world scenario with limited resources.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Scientific Reports
Scientific Reports Natural Science Disciplines-
CiteScore
7.50
自引率
4.30%
发文量
19567
审稿时长
3.9 months
期刊介绍: We publish original research from all areas of the natural sciences, psychology, medicine and engineering. You can learn more about what we publish by browsing our specific scientific subject areas below or explore Scientific Reports by browsing all articles and collections. Scientific Reports has a 2-year impact factor: 4.380 (2021), and is the 6th most-cited journal in the world, with more than 540,000 citations in 2020 (Clarivate Analytics, 2021). •Engineering Engineering covers all aspects of engineering, technology, and applied science. It plays a crucial role in the development of technologies to address some of the world''s biggest challenges, helping to save lives and improve the way we live. •Physical sciences Physical sciences are those academic disciplines that aim to uncover the underlying laws of nature — often written in the language of mathematics. It is a collective term for areas of study including astronomy, chemistry, materials science and physics. •Earth and environmental sciences Earth and environmental sciences cover all aspects of Earth and planetary science and broadly encompass solid Earth processes, surface and atmospheric dynamics, Earth system history, climate and climate change, marine and freshwater systems, and ecology. It also considers the interactions between humans and these systems. •Biological sciences Biological sciences encompass all the divisions of natural sciences examining various aspects of vital processes. The concept includes anatomy, physiology, cell biology, biochemistry and biophysics, and covers all organisms from microorganisms, animals to plants. •Health sciences The health sciences study health, disease and healthcare. This field of study aims to develop knowledge, interventions and technology for use in healthcare to improve the treatment of patients.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信