ارائه پروتکل نوین احرازهویت گمنام سبک وزن با امنیت پیشرو در شبکههای حسگر بیسیم مبتنی بر اینترنت اشیاء
محورهای موضوعی : پردازش چند رسانه ای، سیستمهای ارتباطی، سیستمهای هوشمندمریم رجب زاده عصار 1 , پویا درخشان برجوئی 2
1 - استادیار، گروه مهندسی برق، واحد علوم و تحقیقات، دانشگاه آزاد اسلامی، تهران، ایران
2 - استادیار، گروه مهندسی برق، واحد نایین، دانشگاه آزاد اسلامی، نایین، ایران
کلید واژه: اینترنت اشیاء , احراز هویت , گمنامی , امنیت پیشرو , سبک وزن,
چکیده مقاله :
در این مقاله یک پروتکل سبکوزن ارائه و پیشنهاد شده است که دارای محاسن امنیتی و محاسباتی جدیدی است. جهت مطالعه و بررسی یک پروتکل پایهای و مبنا بر اساس پروتکل پیشنهادی فتوحی و همکارانش که در مجله Computer Networks پیشنهاد شده است. در این مقاله نشان دادیم که برخی از جنبه های امنیتی و محاسباتی پروتکل پیشنهادی نسبت بهپروتکلهای قبلی برتری هایی دارد. با بررسی و تحلیل پروتکل پیشنهادی نشانداده شد که مطابق ادعای انجام شده، پروتکل پیشنهادی هم ویژگی سبکوزن بودن و هم ویژگی امنیت پیشرو (حفظ امنیت کلید های نشست بعدی در صورت افشای یک کلید نشست) را داراست. با تحلیل امنیتیپروتکل فتوحی و همکارانش که در سال ۲۰۲۱ ارایه شده نشاندادیمکه پروتکل پیشنهادی آنها در برابر حملات درگاه بدخواه و عدم همزمانی آسیبپذیر است. همچنین، پروتکل پیشنهادی علاوه بر ویژگیهای مذکور، ویژگی احراز هویت دوطرفه را نیز دارا است. این پروتکل در برابر حملات نیز امن است. درنهایت، پروتکل پیشنهادی را با پروتکلهای مشابه مقایسه کرده و نشان داده شد که پروتکل پیشنهادی۲۴ % در سربار محاسباتی و ۲۶% در سربار مخابراتی بهبود عملکرد را ایجاد کرده است.
Abstract: Due to the fact that this research was aimed at providing a lightweight protocol, therefore, by checking and analyzing, we will show that the protocol proposed in this research is superior to the protocols of Fotuhi and colleagues in some aspects of security and computing. The proposed protocol will be reviewed and shown, as claimed. It was found that the proposed protocol has both the characteristic of being lightweight and the characteristic of advanced security. By analyzing the security of the protocol, we showed that their proposed protocol is resistant to malicious port and asynchrony attacks.
Introduction: The Internet of Things includes an interconnected network that enables various types of communication and plays a critical role in the development of smart services to support and improve the activities of individuals and society. One of the most important concerns of those who use wireless networks is access information through the public channel considering security and privacy. Authentication is therefore important so that no entity, person, or non-virtual device can abuse the network and by maintaining the privacy of users who are using the network. Important information does not reach these people.
Method: We presented a protocol that, in addition to the mentioned features, it also has the feature of two-way authentication. The proposed protocol model consists of three main components which all three entities have already been approved at the registration stage and can communicate with each other to verify their identity. The overall goal is for both the user and the sensor to verify each other's authorization, which is verified by the gateway. This protocol is safe against attacks and finally compared the proposed protocol with the previous and based protocol.
Results: our outcomes from the proposed method showed that the proposed protocol is 24% in computing overhead and 26% Improves telecommunication overhead.
Discussion: In this research, an attempt was made to provide a protocol that would bring sufficient security requirements without the use of a smart card. Also, unauthorized users cannot access the protocol stages by ways such as repetition attacks, identity forgery, lack of synchronization between the sensor and the user, the ability to track and capture the sensor.
[1] Fotouhi, M., Bayat, M., Das, A. K., Far, H. A. N., Pournaghi, S. M., & Doostari, M. A. (2020). A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Computer Networks, 177, 107333.
[2] Porambage، P.، Schmitt، C.، Kumar، P.، Gurtov، A.، & Ylianttila، M. (2014). PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. International Journal of Distributed Sensor Networks، 10(7) 357430
[3] Gope، P.، & Hwang، T. (2016). A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on industrial electronics، 63(11)، 7124-7132.
[4] Ghani، A.، Mansoor، K.، Mehmood، S.، Chaudhry، S. A.، Rahman، A. U.، & Najmus Saqib، M. (2019). Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key. International Journal of Communication Systems، 32(16)، e4139.
[5] Khemissa، H.، Tandjaoui، D.، & Bouzefrane، S. (2017، June). An ultra-lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In International conference on mobile، secure، and programmable networking (pp. 49-62). Springer، Cham
[6] abbasi, N., & Karimi, S. (2022). Dynamic Migration of SDN-based Switches to Distribute Control Layer Load and Increase Efficiency Using Ryu Controller. Intelligent Multimedia Processing and Communication Systems (IMPCS), 3(4), 15-27.
[7] Zand, M., & Tahghighi Sharabian, M. (2020). Improvement of IOT Security in ZigBee Network Using AES256 Algorithm. Intelligent Multimedia Processing and Communication Systems (IMPCS), 1(2), 51-59.
[8] Mousavi, S.H., Safaeian, M., Ahmadi G.,A.H. (2022). A New Method in the Security of Encryption Systems by Unbalanced Gates. . Intelligent Multimedia Processing and Communication Systems (IMPCS), 3(2),39-50.
[9] Derakhshan P., G. Dadashzadeh, F. Razzazi,S. M. Razavizadeh. (2011) .Minimum power transmission design for cognitive radio networks in non-stationary environment. IEICE Journal Electronic Exp., Vol.8, No. 3.
[10] Derakhshan P., G. Dadashzadeh, F. Razzazi,S. M. Razavizadeh. (2011). Bio-inspired distributed beamforming for cognitive radio networks in non-stationary environment. IEICE Journal Electronic Exp., Vol.8, No. 6.
[11] Derakhshan P. (2011). Modified Spectrum Sensing and Awareness in Wireless Radio Networks,” Int. Review on Modeling and Simulations, I.RE.MO.S. Journal, pp. 718-722, Vol. 4. No. 2.
[12] Derakhshan P., G. Dadashzadeh, F. Razzazi,S. M. Razavizadeh. (2013). Power and Time Slot Allocation in Cognitive Relay Networks Using Particle Swarm Optimization. Hindawi Journal.
[13] Farash، M. S.، Turkanović، M.، Kumari، S.، & Hölbl، M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks، 36، 152-176.
[14] Turkanović، M.، Brumen، B.، & Hölbl، M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks، based on the Internet of Things notion. Ad Hoc Networks، 20، 96-112
[15] Bonyadi A., Rajabzadeh Asaar M., Derakhshan B. P.(2023). Security Analysis of a Lightweight Multifactor Authentication Scheme for Internet of Things Applications, 19th Conf. Inf. Tech. Compt. Comm. ITCT, June.