Open Access

ARTICLE

PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks

Xuanang Li1, Shuangshuang Liu1, Saru Kumari2, Chien-Ming Chen1,*
1 Shandong University of Science and Technology, Qingdao, 266590, China
2 Department of Mathematics, Chaudhary Charan Singh University, Meerut, 250004, India
* Corresponding Author: Chien-Ming Chen. Email:
(This article belongs to this Special Issue: Computational Intelligence Techniques for Securing Systems and Networks beyond 5G)

Computer Modeling in Engineering & Sciences 2023, 135(1), 711-732. https://doi.org/10.32604/cmes.2022.022667

Received 20 March 2022; Accepted 27 May 2022; Issue published 29 September 2022

Abstract

Nowadays, the widespread application of 5G has promoted rapid development in different areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of higher data transfer rate, lower latency, and widespread connections. Wireless sensor networks (WSNs), which comprise various sensors, are crucial components of IoT. The main functions of WSN include providing users with real-time monitoring information, deploying regional information collection, and synchronizing with the Internet. Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields. Recently, Yu et al. proposed a user authentication protocol for WSN. However, their design is vulnerable to sensor capture and temporary information disclosure attacks. Thus, in this study, an improved protocol called PSAP-WSN is proposed. The security of PSAP-WSN is demonstrated by employing the ROR model, BAN logic, and ProVerif tool for the analysis. The experimental evaluation shows that our design is more efficient and suitable for WSN environments.

Keywords

5G; wireless sensor networks; IoT; authentication protocol

Cite This Article

Li, X., Liu, S., Kumari, S., Chen, C. (2023). PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks. CMES-Computer Modeling in Engineering & Sciences, 135(1), 711–732.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 158

    View

  • 143

    Download

  • 0

    Like

Share Link

WeChat scan