Vol.68, No.2, 2021, pp.1877-1898, doi:10.32604/cmc.2021.014966
Cogent and Energy Efficient Authentication Protocol for WSN in IoT
  • Tariq Mahmood Butt1, Rabia Riaz1, Chinmay Chakraborty2, Sanam Shahla Rizvi3, Anand Paul4,*
1 Department of CS & IT, University of Azad Jammu and Kashmir, Muzaffarabad, 13100, Pakistan
2 Birla Institute of Technology, Mesra, Jharkhand, 814142, India
3 Raptor Interactive (Pty) Ltd., Eco Boulevard, Witch Hazel Ave, Centurion, 0157, South Africa
4 The School of Computer Science and Engineering, Kyungpook National University, Daegu, 41566, Korea
* Corresponding Author: Anand Paul. Email:
(This article belongs to this Special Issue: Emerging Trends in Cyber Security for Communication Networks)
Received 29 October 2020; Accepted 02 February 2021; Issue published 13 April 2021
Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks. To overcome the limitations of previous schemes, we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme (COBBAS). The proposed scheme is based on biometric data, and uses lightweight operations to enhance the efficiency of the network in terms of time, storage, and battery consumption. A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication. Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks. Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing, impersonation, stolen verifier attacks, denial-of-service attacks, and errors in biometric recognition. This protocol also provides user anonymity, confidentiality, integrity, and biometric recovery in acceptable time with reasonable computational cost.
Internet of things; wireless sensor networks; authentication; Burrows–Abadi–Needham logic; fuzzy extractor; elliptic curve cryptography
Cite This Article
T. M. Butt, R. Riaz, C. Chakraborty, S. S. Rizvi and A. Paul, "Cogent and energy efficient authentication protocol for wsn in iot," Computers, Materials & Continua, vol. 68, no.2, pp. 1877–1898, 2021.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.