Javascript must be enabled to continue!
Robust Multi-Gateway Authentication Scheme for Agriculture Wireless Sensor Network in Society 5.0 Smart Communities
View through CrossRef
Recent Society 5.0 efforts by the Government of Japan are aimed at establishing a sustainable human-centered society by combining new technologies such as sensor networks, edge computing, Internet of Things (IoT) ecosystems, artificial intelligence (AI), big data, and robotics. Many research works have been carried out with an increasing emphasis on the fundamentals of wireless sensor networks (WSN) for different applications; namely precision agriculture, environment, medical care, security, and surveillance. In the same vein, almost all of the known authentication techniques rely on the single gateway node, which is unsuitable for the current sensor nodes that are broadly distributed in the real world. Despite technological advances, resource constraints and vulnerability to an attacker physically capturing some sensor nodes have remained an important and challenging research field for developing wireless sensor network user authentication. This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. The scheme provides a secure mutual authentication using the well-established formal method called BAN logic. The formal security verification of the proposed scheme is validated with the AVISPA tool, a powerful validation method for network security applications. In addition, the security of the scheme was informally analyzed to demonstrate that the scheme is secure from different attacks, e.g., sensor capture, replay, and other network and physical attacks. Furthermore, the communication and computation costs of the proposed scheme are evaluated and show better performance than the existing authentication schemes.
Title: Robust Multi-Gateway Authentication Scheme for Agriculture Wireless Sensor Network in Society 5.0 Smart Communities
Description:
Recent Society 5.
0 efforts by the Government of Japan are aimed at establishing a sustainable human-centered society by combining new technologies such as sensor networks, edge computing, Internet of Things (IoT) ecosystems, artificial intelligence (AI), big data, and robotics.
Many research works have been carried out with an increasing emphasis on the fundamentals of wireless sensor networks (WSN) for different applications; namely precision agriculture, environment, medical care, security, and surveillance.
In the same vein, almost all of the known authentication techniques rely on the single gateway node, which is unsuitable for the current sensor nodes that are broadly distributed in the real world.
Despite technological advances, resource constraints and vulnerability to an attacker physically capturing some sensor nodes have remained an important and challenging research field for developing wireless sensor network user authentication.
This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.
0 environment.
The scheme provides a secure mutual authentication using the well-established formal method called BAN logic.
The formal security verification of the proposed scheme is validated with the AVISPA tool, a powerful validation method for network security applications.
In addition, the security of the scheme was informally analyzed to demonstrate that the scheme is secure from different attacks, e.
g.
, sensor capture, replay, and other network and physical attacks.
Furthermore, the communication and computation costs of the proposed scheme are evaluated and show better performance than the existing authentication schemes.
Related Results
Centaurs transitioning to JFCs: thermal and dynamical evolution
Centaurs transitioning to JFCs: thermal and dynamical evolution
<p>1- Context</p>
<p>Jupiter-family Comets are continuously replenished from their outer solar system reservoirs. Before they enter the in...
Dynamic stochastic modeling for inertial sensors
Dynamic stochastic modeling for inertial sensors
Es ampliamente conocido que los modelos de error para sensores inerciales tienen dos componentes: El primero es un componente determinista que normalmente es calibrado por el fabri...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Through sensor networks, agriculture can be connected to the IoT, which allows us to create connections among agronomists, farmers, and crops regardless of their geographical diffe...
Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network
Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network
Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of ...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
GEOSPATIAL ASPECTS OF FINANCIAL CAPACITY OF TERRITORIAL COMMUNITIES OF TERNOPIL REGION
GEOSPATIAL ASPECTS OF FINANCIAL CAPACITY OF TERRITORIAL COMMUNITIES OF TERNOPIL REGION
In the article geospatial aspects of the financial capacity of territorial communities of Ternopil region are described. The need to conduct such a study has been updated, since no...

