Indonesian Journal of Electrical Engineering and Computer Science
Vol 33, No 3: March 2024

Authentication schemes in wireless internet of things sensor networks: a survey and comparison

Pendukeni Phalaagae (Botswana International University of Science and Technology)
Adamu Murtala Zungeru (Botswana International University of Science and Technology)
Boyce Sigweni (Botswana International University of Science and Technology)
Selvaraj Rajalakshmi (Botswana International University of Science and Technology)



Article Info

Publish Date
01 Mar 2024

Abstract

The proliferation of wireless sensor networks (WSNs) fuels internet of things (IoT's) rapid global development, connecting diverse devices. IoT transforms devices into intelligent entities delivering exceptional services. This work addresses IoT authentication gaps through a comprehensive survey, analyzing recent works and exploring techniques in various applications. It includes a comparative analysis of authentication schemes, evaluating Bi-Phase authentication scheme (BAS) in WSNs. BAS outperforms sensor protocol for information via negotiation (SPIN), broadcast session key protocol (BROSK), and localized encryption and authentication protocol (LEAP), resulting in lower energy consumption and higher efficiency. With energy efficiency at 60 Kb/J for 25 nodes, BAS focuses on power optimization and lightweight security measures, reducing energy consumption, maximizing efficiency, and extending WSN lifespan. The evaluation, conducted using MATLAB/Simulink, demonstrates BAS's superiority, achieving 10 J, 12 J, 14 J, and 15 J energy consumption for 25 nodes during simulation, showcasing its effectiveness and future potential in advancing IoT authentication.

Copyrights © 2024