MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration

Uloženo v:
Podrobná bibliografie
Vydáno v:Computers vol. 14, no. 9 (2025), p. 347-379
Hlavní autor: Alyanbaawi Ashraf
Vydáno:
MDPI AG
Témata:
On-line přístup:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!

MARC

LEADER 00000nab a2200000uu 4500
001 3254479592
003 UK-CbPIL
022 |a 2073-431X 
024 7 |a 10.3390/computers14090347  |2 doi 
035 |a 3254479592 
045 2 |b d20250101  |b d20251231 
084 |a 231447  |2 nlm 
100 1 |a Alyanbaawi Ashraf 
245 1 |a MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes. However, existing lightweight authentication protocols for IWSNs remain vulnerable to sophisticated security attacks because of inadequate initial authentication phases. This study presents a security analysis of Gope et al.’s PUF-based authentication protocol for IWSNs and identifies critical vulnerabilities that enable man-in-the-middle (MITM) and denial-of-service (DoS) attacks. We demonstrate that Gope et al.’s protocol is susceptible to MITM attacks during both authentication and Secure Periodical Data Collection (SPDC), allowing adversaries to derive session keys and compromise communication confidentiality. Our analysis reveals that the sensor registration phase of the protocol lacks proper authentication mechanisms, enabling attackers to perform unauthorized PUF queries and subsequently mount successful attacks. To address these vulnerabilities, we propose an enhanced authentication scheme that introduces a sensor-initiated registration process. In our improved protocol, sensor nodes generate and control PUF challenges rather than passively responding to gateway requests. This modification prevents unauthorized PUF queries while preserving the lightweight characteristics essential for resource-constrained IWSN deployments. Security analysis demonstrates that our enhanced scheme effectively mitigates the identified MITM and DoS attacks without introducing significant computational or communication overhead. The proposed modifications maintain compatibility with the existing IWSN infrastructure while strengthening the overall security posture. Comparative analysis shows that our solution addresses the security weaknesses of the original protocol while preserving its practical advantages for industrial use. The enhanced protocol provides a practical and secure solution for real-time data access in IWSNs, making it suitable for deployment in mission-critical industrial environments where both security and efficiency are paramount. 
653 |a Authentication protocols 
653 |a Queries 
653 |a Communication 
653 |a Sensors 
653 |a Wireless sensor networks 
653 |a Industry 4.0 
653 |a Design 
653 |a Distributed control systems 
653 |a Industrial applications 
653 |a Denial of service attacks 
653 |a Registration 
653 |a Real time 
653 |a Performance evaluation 
653 |a Authentication 
653 |a Data collection 
773 0 |t Computers  |g vol. 14, no. 9 (2025), p. 347-379 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3254479592/abstract/embedded/H09TXR3UUZB2ISDL?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3254479592/fulltextwithgraphics/embedded/H09TXR3UUZB2ISDL?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3254479592/fulltextPDF/embedded/H09TXR3UUZB2ISDL?source=fedsrch