Skip to main navigation Skip to search Skip to main content

An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment

Research output: Contribution to journalArticlepeer-review

Abstract

The Internet of Underwater Things (IoUT) and Underwater Sensor Networks (UWSN) are technologies that benefit multiple disciplines, including offshore exploration, aquaculture, and natural disaster prediction. Given the challenging operating conditions with the inherent capacity limitations of underwater sensors, specialized protocols are necessary to ensure secure and efficient communication. In this paper, we highlight some of the advancements related to UWSNs. Based on a comprehensive review of previous work, we propose a protocol that considers security and performance requirements using lightweight operations and mutual authentication, which is a security process in which both parties establish the identity of the other to gain confidence in the communication before any data is exchanged. In the UWSNs setting, this implies achieving secure communication between nodes and base stations. The scheme's performance was evaluated using Burrows-Abadi-Needham (BAN) logic and the Automated Validation of Internet Security Protocols Applications (AVISPA) simulation. We can confirm that the proposed protocol outperforms previous work regarding security, computational overhead, and communication cost. Additionally, comparative analysis demonstrates that our protocol withstands different types of cyber-attacks while achieving an improved overall performance compared to other related schemes.

Original languageEnglish
Pages (from-to)175773-175789
Number of pages17
JournalIEEE Access
Volume12
DOIs
StatePublished - 2024

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 14 - Life Below Water
    SDG 14 Life Below Water

Keywords

  • Authentication
  • IoUT
  • reauthentication
  • security
  • sensor network
  • underwater

Fingerprint

Dive into the research topics of 'An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment'. Together they form a unique fingerprint.

Cite this