Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions

dc.contributor.authorEledlebi, Khouloud
dc.contributor.authorAlzubaidi, Ahmed Adel
dc.contributor.authorYeun, Chan Yeob
dc.contributor.authorDamiani, Ernesto
dc.contributor.authorMateu Meseguer, Víctor
dc.contributor.authorAl-Hammadi, Yousof
dc.date.accessioned2023-01-04T12:40:31Z
dc.date.available2023-01-04T12:40:31Z
dc.date.issued2022
dc.description.abstractThe evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cybersecurity handling of IoT cannot be achieved in a single broadcast authentication protocol. This paper presents a new hybrid protocol called Hybrid Two-level µ-timed-efficient stream loss-tolerant authentication (Hybrid TLI-µTESLA) protocol, which maximizes the benefits of the previous TESLA protocol variants, including scalability support and immediate authentication of Multilevel-µTESLA protocol and continuous authentication with minimal computation overhead of enhanced Inf-TESLA protocol. The inclusion of three different keychains and checking criteria of the packets in the Hybrid TLI-µTESLA protocol enabled resistance against Masquerading, Modification, Man-in-the-Middle, Brute-force, and DoS attacks. A solution for the authentication problem in the first and last packets of the high-level and low-level keychains of the Multilevel-µTESLA protocol was also proposed. The simulation analysis was performed using Java, where we compared the Hybrid TLI-µTESLA protocol with other variants for time complexity and computation overhead at the sender and receiver sides. We also conducted a comparative analysis between two hash functions, SHA-2 and SHA-3, and assessed the feasibility of the proposed protocol in the forthcoming 6G technology. The results demonstrated the superiority of the proposed protocol over other variants in terms of immediate and continuous authentication, scalability, cybersecurity, lifetime, network performance, and compatibility with 5G and 6G IoT generations.ca_ES
dc.description.sponsorshipThis research was funded by Technology Innovation Institute under grand number 8434000386-TII-ATM-2035-2020.ca_ES
dc.identifier.doihttps://doi.org/10.3390/s22239063
dc.identifier.issn1424-8220
dc.identifier.urihttp://hdl.handle.net/10459.1/85177
dc.language.isoengca_ES
dc.publisherMDPIca_ES
dc.relation.isformatofReproducció del document publicat a https://doi.org/10.3390/s22239063ca_ES
dc.relation.ispartofSensors, 2022, vol. 22, núm. 23, 9063ca_ES
dc.rightscc-by (c) Khouloud Eledlebi et al., 2022ca_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccessca_ES
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectContinuous authenticationca_ES
dc.subjectScalabilityca_ES
dc.subjectCybersecurityca_ES
dc.subjectHash functionca_ES
dc.subjectImmediate authenticationca_ES
dc.subjectLow overheadca_ES
dc.subjectTESLA protocolca_ES
dc.titleSimulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functionsca_ES
dc.typeinfo:eu-repo/semantics/articleca_ES
dc.type.versioninfo:eu-repo/semantics/publishedVersionca_ES
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
sensors_a2022v22n23art9063.pdf
Size:
5.17 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: