ITM Web Conf.
Volume 52, 2023International Conference on Connected Object and Artificial Intelligence (COCIA’2023)
|Number of page(s)||11|
|Section||Connected Objects and Systems|
|Published online||08 May 2023|
Formal security analysis of an IoT mutual authentication protocol
Laboratory of Applied Mathematics and Intelligent Systems Engineering (MAISI), National School of Applied Sciences (ENSA), 80999 Agadir, Morocco
* Corresponding author: firstname.lastname@example.org
Wireless sensor networks (WSNs) are widely used in day to day activities in order to provide users with multiple services such as smart grids, smart homes, industrial internet of things (IoT), agriculture and health-care. These services are provided by collecting and transmitting the sensing data to the gateway node over an unsafe channel, having constraints of security, energy consumption and connectivity. In 2022, Fariss et al. proposed an ECC-based mutual authentication and key agreement protocol for WSNs. They provided its informal security and showed that it’s secure against many security threats. They also formally analyzed the scheme’s security using AVISPA Tool. In this article, we analyze the security of Fariss et. Al protocol using GNY logic, an advanced version of BAN logic.
© The Authors, published by EDP Sciences, 2023
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.