With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private data being exposed on the Internet. Private data are vulnerable to hacking. Many complex wireless-sensor-authentication protocols have been proposed. In this paper, we proposed an efficient authentication protocol for IIoT-oriented wireless sensor networks. The protocol introduces the PUF chip, and uses the Bloom filter to save and query the challenge-response pairs generated by the PUF chip. It ensures the security of the physical layer of the device and reduces the computing cost and communication cost of the wireless sensor side. The protocol introduces a pre-authentication mechanism to achieve continuous authentication between the gateway and the cloud server. The overall computational cost of the protocol is reduced. Formal security analysis and informal security analysis proved that our proposed protocol has more security features. We implemented various security primitives using the MIRACL cryptographic library and GMP large number library. Our proposed protocol was compared in-depth with related work. Detailed experiments show that our proposed protocol significantly reduces the computational cost and communication cost on the wireless sensor side and the overall computational cost of the protocol.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9571722 | PMC |
http://dx.doi.org/10.3390/s22197413 | DOI Listing |
Acta Bioeng Biomech
September 2024
Department of Rehabilitation and Physiotherapy, Poznan University of Medical Sciences, Poznań, Poland.
: This study aimed to assess knee joint function in post-stroke patients using wireless motion sensors and functional tests. This type of evaluation may be important for improving gait quality. : The study included 25 post-stroke patients (age 53.
View Article and Find Full Text PDFCoal mining industry is one of the main source for economy of every nations, whereas safety in the underground coal mining area is still doubtful. According to some reports, there is heavy loss of life and money due to the occasional accidents in the coal mining area. Some existing researchers has been addressed this issue and approached their method.
View Article and Find Full Text PDFBackground: Intrabdominal pressure (IAP) is an important parameter. Elevated IAP can reduce visceral perfusion, lead to intraabdominal hypertension, and result in life-threatening abdominal compartment syndrome. While ingestible capsular devices have been used for various abdominal diagnoses, their application in continuous IAP monitoring remains unproven.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Biomedical Engineering, Yonsei University, Wonju 26493, Republic of Korea.
This study presents the fabrication of a sustainable flexible humidity sensor utilizing chitosan derived from mealworm biomass as the primary sensing material. The chitosan-based humidity sensor was fabricated by casting chitosan and polyvinyl alcohol (PVA) films with interdigitated copper electrodes, forming a laminate composite suitable for real-time, resistive-type humidity detection. Comprehensive characterization of the chitosan film was performed using Fourier-transform infrared (FTIR) spectroscopy, contact angle measurements, and tensile testing, which confirmed its chemical structure, wettability, and mechanical stability.
View Article and Find Full Text PDFSensors (Basel)
January 2025
State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China.
As advancements in autonomous underwater vehicle (AUV) technology unfold, the role of underwater wireless sensor networks (UWSNs) is becoming increasingly pivotal. However, the high energy consumption in these networks can significantly reduce their operational lifespan, while latency issues can impair overall network performance. To address these challenges, a novel mixed packet forwarding strategy is developed, which incorporates a wakeup threshold and a dynamically adjusted access probability for the cluster head (CH).
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!