Fig. 1. Initial design based on hash chain
Fig. 2. Sensor Node -MN Authentication Protocol
Fig. 3. Sensor-MN Communication Protocol
Table 1. Proposed Notation
Table 2. Security Analysis
References
- YICK, Jennifer; MUKHERJEE, Biswanath; GHOSAL, Dipak. Wireless sensor network survey. Computer networks, 52.12: 2292-2330. 2008. DOI: https://doi.org/10.1016/j.comnet.2008.04.002
- ZHANG, Zhi-Kai, et al. IoT security: ongoing challenges and research opportunities. In: Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on. IEEE, pp. 230-234. 2014. DOI: https://doi.org/10.1109/soca.2014.58
- XU, Teng; WENDT, James B.; POTKONJAK, Miodrag. Security of IoT systems: Design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design. IEEE Press, pp. 417-423. 2014. DOI: https://doi.org/10.1109/iccad.2014.7001385
- RIAHI, Arbia, et al. A systemic approach for IoT security. In: Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on. IEEE, pp. 351-355. 2013. DOI: https://doi.org/10.1109/dcoss.2013.78
- MAHMOUD, Rwan, et al. Internet of things (IoT) security: Current status, challenges and prospective measures. In: Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for. IEEE, pp. 336-341. 2015. DOI: https://doi.org/10.1109/icitst.2015.7412116
- ZHAO, Kai; GE, Lina. A survey on the internet of things security. In: Computational Intelligence and Security (CIS), 2013 9th International Conference on. IEEE, pp. 663-667. 2013. DOI: https://doi.org/10.1109/cis.2013.145
- WURM, Jacob, et al. Security analysis on consumer and industrial iot devices. In: Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific. IEEE, pp. 519-524. 2016. DOI: https://doi.org/10.1109/aspdac.2016.7428064
- RIAHI, Arbia, et al. A systemic and cognitive approach for IoT security. In: Computing, Networking and Communications (ICNC), 2014 International Conference on. IEEE, pp. 183-188. 2014. DOI: https://doi.org/10.1109/iccnc.2014.6785328
- YAO, Xuanxia, et al. A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sensors Journal, 13.10: 3693-3701. 2013. DOI: https://doi.org/10.1109/jsen.2013.2266116
- N. Haller, Bellcore, The S/KEY One-Time Password System, February 1995. DOI: https://doi.org/10.17487/rfc1760
- PARK, Joonggil. The development of a one-time password mechanism improving on S/KEY. Korea Institute of Information Security & Cryptology, 9.2: 25-35. 1999.
- ZHANG, Yuan, et al. Training Demand Analysis for Airlines Safety Manager Based on Improved OTP Model. In: International Conference on Human-Computer Interaction. Springer, Cham, pp. 334-342. 2018. DOI: https://doi.org/10.1007/978-3-319-92285-0_46
- Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei Gurtov, Mika Ylianttila, "Two-phase Authentication Protocol for Wireless Sensor Networks in Distributed IoT Applications", IEEE Wireless Communications and Networking Conference (WCNC), 04. 06. 2014. DOI: https://doi.org/10.1109/wcnc.2014.6952860
- Farash, Mohammad Sabzinejad, Turkanovic Muhamed, Kumari Saru, and Marko Holbl. "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment." Ad Hoc Networks 36, 152-176. 2016. DOI: https://doi.org/10.1016/j.adhoc.2015.05.014
- Baruah, Khanjan Ch, Banerjee Subhasish, Dutta Manash P, Bhunia Chandan T. "An improved biometric-based multi-server authentication scheme using smart card." International Journal of Security and Its Applications 9.1, 397-408. 2015. DOI: https://doi.org/10.14257/ijsia.2015.9.1.38