MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration
Uloženo v:
| Vydáno v: | Computers vol. 14, no. 9 (2025), p. 347-379 |
|---|---|
| Hlavní autor: | |
| Vydáno: |
MDPI AG
|
| Témata: | |
| On-line přístup: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| Tagy: |
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3254479592 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2073-431X | ||
| 024 | 7 | |a 10.3390/computers14090347 |2 doi | |
| 035 | |a 3254479592 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 231447 |2 nlm | ||
| 100 | 1 | |a Alyanbaawi Ashraf | |
| 245 | 1 | |a MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes. However, existing lightweight authentication protocols for IWSNs remain vulnerable to sophisticated security attacks because of inadequate initial authentication phases. This study presents a security analysis of Gope et al.’s PUF-based authentication protocol for IWSNs and identifies critical vulnerabilities that enable man-in-the-middle (MITM) and denial-of-service (DoS) attacks. We demonstrate that Gope et al.’s protocol is susceptible to MITM attacks during both authentication and Secure Periodical Data Collection (SPDC), allowing adversaries to derive session keys and compromise communication confidentiality. Our analysis reveals that the sensor registration phase of the protocol lacks proper authentication mechanisms, enabling attackers to perform unauthorized PUF queries and subsequently mount successful attacks. To address these vulnerabilities, we propose an enhanced authentication scheme that introduces a sensor-initiated registration process. In our improved protocol, sensor nodes generate and control PUF challenges rather than passively responding to gateway requests. This modification prevents unauthorized PUF queries while preserving the lightweight characteristics essential for resource-constrained IWSN deployments. Security analysis demonstrates that our enhanced scheme effectively mitigates the identified MITM and DoS attacks without introducing significant computational or communication overhead. The proposed modifications maintain compatibility with the existing IWSN infrastructure while strengthening the overall security posture. Comparative analysis shows that our solution addresses the security weaknesses of the original protocol while preserving its practical advantages for industrial use. The enhanced protocol provides a practical and secure solution for real-time data access in IWSNs, making it suitable for deployment in mission-critical industrial environments where both security and efficiency are paramount. | |
| 653 | |a Authentication protocols | ||
| 653 | |a Queries | ||
| 653 | |a Communication | ||
| 653 | |a Sensors | ||
| 653 | |a Wireless sensor networks | ||
| 653 | |a Industry 4.0 | ||
| 653 | |a Design | ||
| 653 | |a Distributed control systems | ||
| 653 | |a Industrial applications | ||
| 653 | |a Denial of service attacks | ||
| 653 | |a Registration | ||
| 653 | |a Real time | ||
| 653 | |a Performance evaluation | ||
| 653 | |a Authentication | ||
| 653 | |a Data collection | ||
| 773 | 0 | |t Computers |g vol. 14, no. 9 (2025), p. 347-379 | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3254479592/abstract/embedded/H09TXR3UUZB2ISDL?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3254479592/fulltextwithgraphics/embedded/H09TXR3UUZB2ISDL?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3254479592/fulltextPDF/embedded/H09TXR3UUZB2ISDL?source=fedsrch |