User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition

2017 
In security-sensitive wireless networks of sensor devices, the authenticity of the legitimate user is the prominent requirement. Because of constraints-resources of these sensor devices implementing traditional cryptographic mechanism is not an easy task. In this paper, we propose a lightweight mechanism for authenticating users of a sensor network using fuzzy extractor along with a novel matrix based session key establishment scheme. After that, we perform the security analysis of our protocol using widely accepted automated verification tools such as AVISPA and Scyther. Then, we perform logical verification using BAN Logic. Finally, we do the computational analysis, and we demonstrate the comparative analysis in respect of computational overhead and security features.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    23
    References
    0
    Citations
    NaN
    KQI
    []