Loading…

A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems

The underwater green transport system ( UwGTs ) is a network of connected, intelligent underwater sensors or Internet of Things (IoT) devices. The sensor networks used in UwGTs are distinct from traditional territorial wireless sensor networks in many ways, including their lengthy propagation delays...

Full description

Saved in:
Bibliographic Details
Published in:Annales des télécommunications 2024-06, Vol.79 (5-6), p.415-436
Main Authors: Yaduvanshi, Ritika, Mishra, Shivendu, Yadav, Nimisha, Rajpoot, Prince
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The underwater green transport system ( UwGTs ) is a network of connected, intelligent underwater sensors or Internet of Things (IoT) devices. The sensor networks used in UwGTs are distinct from traditional territorial wireless sensor networks in many ways, including their lengthy propagation delays, restricted bandwidths, and poor reliability. UwGTs would face significant security difficulties due to these unique traits. The main goal of this paper is to resolve authentication issues across the entire UwGTs network. The more significant challenge in developing an authentication scheme for UwGTs is to develop a simple, efficient, and secure system that considers the sensor nodes’ resource limitations. In light of this, we suggest an identity-based signature-based authentication scheme based on elliptic curve cryptography that enhances network lifetime by reducing sensor node energy consumption. The security of the suggested scheme has also been confirmed using a formal security assessment technique like the Random Oracle Model (ROM) and Automated Validation of Internet Security Protocols and Applications (AVISPA) software tools. In addition, the proposed scheme is more effective and lightweight regarding computation costs, communication costs, energy consumption, and comparative energy efficiency than the existing identity-based authentication schemes.
ISSN:0003-4347
1958-9395
DOI:10.1007/s12243-023-00999-y