{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:32Z","timestamp":1773511232171,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"university-enterprise cooperative R&amp;D project","award":["20221061030001"],"award-info":[{"award-number":["20221061030001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>Wireless networks have continued to evolve to offer connectivity between users and smart devices such as drones and wireless sensor nodes. In this environment, insecure public channels are deployed to link the users to their remote smart devices. Some of the application areas of these smart devices include military surveillance and healthcare monitoring. Since the data collected and transmitted to the users are highly sensitive and private, any leakages can have adverse effects. As such, strong entity authentication should be implemented before any access is granted in these wireless networks. Although numerous protocols have been developed for this purpose, the simultaneous attainment of robust security and privacy at low latencies, execution time and bandwidth remains a mirage. In this paper, a session-dependent token-based payload enciphering scheme for integrity enhancements in wireless networks is presented. This protocol amalgamates fuzzy extraction with extended Chebyshev chaotic maps to boost the integrity of the exchanged payload. The security analysis shows that this scheme offers entity anonymity and backward and forward key secrecy. In addition, it is demonstrated to be robust against secret ephemeral leakage, side-channeling, man-in-the-middle and impersonation attacks, among other security threats. From the performance perspective, the proposed scheme requires the least communication overheads and a relatively low execution time during the authentication process.<\/jats:p>","DOI":"10.3390\/jsan11030055","type":"journal-article","created":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T21:47:27Z","timestamp":1663624047000},"page":"55","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks"],"prefix":"10.3390","volume":"11","author":[{"given":"Zaid Ameen","family":"Abduljabbar","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"},{"name":"Technical Computer Engineering Department, Al-Kunooze University College, Basrah 61001, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6546-8083","authenticated-orcid":false,"given":"Vincent","family":"Omollo Nyangaresi","sequence":"additional","affiliation":[{"name":"Faculty of Biological & Physical Sciences, Tom Mboya University, Homabay 40300, Kenya"}]},{"given":"Mustafa A.","family":"Al Sibahee","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China"},{"name":"Computer Technology Engineering Department, Iraq University College, Basrah 61004, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9126-6143","authenticated-orcid":false,"given":"Mudhafar Jalil Jassim","family":"Ghrabat","sequence":"additional","affiliation":[{"name":"IoT Research Center, Department of Pharmacy, Ashur University College, Baghdad 10047, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2666-6874","authenticated-orcid":false,"given":"Junchao","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8068-5710","authenticated-orcid":false,"given":"Iman","family":"Qays Abduljaleel","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1039-6462","authenticated-orcid":false,"given":"Abdulla J. Y.","family":"Aldarwish","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah 61004, Iraq"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1080\/09720529.2019.1627072","article-title":"A secure three-factor authentication scheme for wireless sensor networks using ECC","volume":"23","author":"Kumar","year":"2020","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.30564\/jcsr.v3i4.3661","article-title":"Efficient Authentication Algorithm for Secure Remote Access in Wireless Sensor Networks","volume":"3","author":"Peter","year":"2021","journal-title":"J. Comput. Sci. Res."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.jnca.2015.09.008","article-title":"Applications of wireless sensor networks for urban areas: A survey","volume":"60","author":"Rashid","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Karakaya, A., and Akleylek, S. (2018, January 22\u201325). A survey on security threats and authentication approaches in wireless sensor networks. Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey.","DOI":"10.1109\/ISDFS.2018.8355381"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1109\/JSYST.2020.2981049","article-title":"A novel three-factor authentication protocol for wireless sensor networks with IoT notion","volume":"15","author":"Wu","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O. (2021, January 13\u201315). ECC Based Authentication Scheme for Smart Homes. Proceedings of the 2021 International Symposium ELMAR, Zadar, Croatia.","DOI":"10.1109\/ELMAR52657.2021.9550911"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"6119","DOI":"10.1109\/JSEN.2017.2732464","article-title":"An optimization scheme of enhanced adaptive dynamic energy consumption based on joint network-channel coding in wsns","volume":"17","author":"Liu","year":"2017","journal-title":"IEEE Sens. J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.future.2017.06.018","article-title":"A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring","volume":"84","author":"Ali","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2602","DOI":"10.1109\/TIFS.2020.2973875","article-title":"A collaborative security framework for software-defined wireless sensor networks","volume":"15","author":"Miranda","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O., and Ogundoyin, S.O. (2021, January 5\u20138). Certificate Based Authentication Scheme for Smart Homes. Proceedings of the 2021 3rd Global Power, Energy and Communication Conference (GPECOM), Antalya, Turkey.","DOI":"10.1109\/GPECOM52585.2021.9607322"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O., Rodrigues, A.J., and Abeka, S.O. (2020, January 29\u201330). Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications. Proceedings of the 2020 16th International Computer Engineering Conference (ICENCO), Cairo, Egypt.","DOI":"10.1109\/ICENCO49778.2020.9357372"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O. (2021, January 19\u201320). Hardware Assisted Protocol for Attacks Prevention in Ad Hoc Networks. Proceedings of the International Conference for Emerging Technologies in Computing, London, UK.","DOI":"10.1007\/978-3-030-90016-8_1"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"67555","DOI":"10.1109\/ACCESS.2020.2985719","article-title":"A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things","volume":"8","author":"Shin","year":"2020","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","article-title":"Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks","volume":"21","author":"He","year":"2015","journal-title":"Multimed. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2643","DOI":"10.1002\/sec.1214","article-title":"A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity","volume":"9","author":"Li","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s00530-015-0476-3","article-title":"An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks","volume":"23","author":"Wu","year":"2017","journal-title":"Multimed. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1016\/j.future.2019.04.019","article-title":"Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme","volume":"100","author":"Arshad","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"85440","DOI":"10.1109\/ACCESS.2019.2923777","article-title":"An improved three-factor user authentication and key agreement scheme for wireless medical sensor networks","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s12083-017-0627-8","article-title":"Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks","volume":"12","author":"Aghili","year":"2019","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_20","first-page":"4815","article-title":"Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps","volume":"14","author":"Nikooghadam","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/TDSC.2018.2828306","article-title":"Cloud Centric Authentication for Wearable Healthcare Monitoring System","volume":"17","author":"Srinivas","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"101596","DOI":"10.1109\/ACCESS.2019.2930542","article-title":"A Provably Secure Anonymous Biometrics- Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","article-title":"An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks","volume":"8","author":"Jiang","year":"2015","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s12083-015-0404-5","article-title":"A new and secure authentication scheme for wireless sensor networks with formal proof","volume":"10","author":"Wu","year":"2017","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Park, Y. (2016). Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors, 16.","DOI":"10.3390\/s16122123"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, C., Xu, G., and Sun, J. (2017). An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors, 17.","DOI":"10.3390\/s17122946"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Maurya, A., and Sastry, V.N. (2017). Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and Internet of Things. Information, 8.","DOI":"10.3390\/info8040136"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"e2933","DOI":"10.1002\/dac.2933","article-title":"A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor","volume":"30","author":"Das","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s12083-014-0324-9","article-title":"A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks","volume":"9","author":"Das","year":"2016","journal-title":"Peer--Peer Netw. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1007\/s11277-015-2288-3","article-title":"A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks","volume":"82","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_31","first-page":"1","article-title":"An improved and provably secure three-factor user authentication scheme for wireless sensor networks","volume":"11","author":"Wu","year":"2016","journal-title":"Peer--Peer Netw. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","article-title":"Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks","volume":"101","author":"Amin","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","article-title":"Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks","volume":"5","author":"Jiang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","article-title":"A Robust ECC-Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Amjad, M., Qureshi, H.K., Lestas, M., Mumtaz, S., and Rodrigues, J.J.P.C. (2018, January 3\u20136). Energy prediction based MAC layer optimization for harvesting enabled WSNs in smart cities. Proceedings of the 87th IEEE Vehicular Technology Conference, Porto, Portugal.","DOI":"10.1109\/VTCSpring.2018.8417855"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Murugesan, R., Saravanan, M., and Vijyaraj, M. (2014, January 21\u201323). A node authentication clustering based security for adhoc network. Proceedings of the 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP), online.","DOI":"10.1109\/ICCSP.2014.6950038"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1844","DOI":"10.1109\/TC.2014.2349524","article-title":"Collaborative location based sleep scheduling for wireless sensor networks integrated with mobile cloud computing","volume":"64","author":"Zhu","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A deep learning approach for intrusion detection using recurrent neural networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ma, T., Yu, Y., Wang, F., Zhang, Q., and Chen, X. (2016). A hybrid methodologies for intrusion detection based deep neural network with support vector machine and clustering technique. Sensors, 16.","DOI":"10.1007\/978-981-10-3187-8_13"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","article-title":"Building an intrusion detection system using a filter-based feature selection algorithm","volume":"65","author":"Ambusaidi","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., and Kim, H. (2016, January 15\u201317). Long short term memory recurrent neural network classifier for intrusion detection. Proceedings of the IEEE 2016 International Conference on Platform Technology and Service (PlatCon), Jeju, South Korea.","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"36773684","DOI":"10.1109\/JSEN.2013.2262271","article-title":"Practical secure communication for integrating wireless sensor networks into the internet of things","volume":"13","author":"Li","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O. (2021, January 13\u201315). Lightweight Key Agreement and Authentication Protocol for Smart Homes. Proceedings of the 2021 IEEE AFRICON, Arusha, Tanzania.","DOI":"10.1109\/AFRICON51333.2021.9571001"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Chen CL, Shih TF, Tsai YT, Li DK (2015). A bilinear pairing-based dynamic key management and authentication for wireless sensor networks. J. Sens., 2015, 1\u201315.","DOI":"10.1155\/2015\/534657"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O., Rodrigues, A.J., and Taha, N.K. (2021, January 6\u20137). Mutual Authentication Protocol for Secure VANET Data Exchanges. Proceedings of the International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, Virtula Event.","DOI":"10.1007\/978-3-030-78459-1_5"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2884","DOI":"10.1109\/JIOT.2017.2714179","article-title":"Chaotic Map-Based Anonymous User Authentication Scheme with User Biometrics and Fuzzy Extractor for Crowds the proposed cing Internet of Things","volume":"5","author":"Roy","year":"2018","journal-title":"IEEE Internet Things J."}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/11\/3\/55\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:34:19Z","timestamp":1760142859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/11\/3\/55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":46,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["jsan11030055"],"URL":"https:\/\/doi.org\/10.3390\/jsan11030055","relation":{},"ISSN":["2224-2708"],"issn-type":[{"value":"2224-2708","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,19]]}}}