SDIWSN: A Software-Defined Networking-Based Authentication Protocol for Real-Time Data Transfer in Industrial Wireless Sensor Networks

Privacy and security are the key issues in Industrial Wireless Sensor Networks (IWSN) as the wireless sensor nodes are typically deployed in a hostile environment (i.e., in a remote location where minimum or no human intervention is required) and can be easily compromised by an attacker. Several pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE eTransactions on network and service management 2022-09, Vol.19 (3), p.3465-3477
Hauptverfasser: Roy, Prasanta Kumar, Bhattacharya, Ansuman
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Privacy and security are the key issues in Industrial Wireless Sensor Networks (IWSN) as the wireless sensor nodes are typically deployed in a hostile environment (i.e., in a remote location where minimum or no human intervention is required) and can be easily compromised by an attacker. Several protocols have been proposed to address these issues. However, none of them can fulfill the required privacy and security goals. Additionally, the traditional network architecture presents a performance bottleneck due to the rapidly increasing traffic volume and heterogeneous sensor nodes. Hence, the existing architecture needs to be upgraded accordingly. In this article, we propose a Software-Defined Networking (SDN)-based authentication protocol for real-time data transfer in IWSN, called SDIWSN. SDIWSN puts the management and control functions of the network into a set of logically centralized SDN controllers, thus providing a global view of the network. SDIWSN achieves several privacy and security requirements such as anonymity, unlinkability, mutual authentication, key agreement, forward secrecy and robustness against passive and active attacks. Moreover, SDIWSN provides a simple velocity-based strategy to detect cloning attacks. We validate the privacy and security features of SDIWSN using formal and informal verification. Finally, the efficiency of SDIWSN is measured through a performance-based comparison.
ISSN:1932-4537
1932-4537
DOI:10.1109/TNSM.2022.3173975