Research Article
Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network
Algorithm 1
Authentication protocol under normal circumstances.
| (1) | //INPUT: The excitation response pairs generated by PUF | | (2) | //OUTPUT: Authentication success/failure message | | (3) | BEGIN | | (4) | Execute butterfly seed generation algorithm to generate and key , ; | | (5) | and sensor nodes simultaneously execute pseudo-random sequence generator to generate ; | | (6) | The sensor node calculates the value of by , and then sends it to ; | | (7) | reads the database to get , and calculates by ; | | (8) | IF the error between and is within the acceptable range, ; | | (9) | THEN authenticates the sensor node successfully, considers the sensor node to be a trusted entity, and sends authentication success message, ; | | (10) | ELSE send authentication failure message, ; | | (11) | calculates by and sends it to sensor node; | | (12) | END IF | | (13) | IF the error between and is within the acceptable range, ; | | (14) | THEN the sensor node authenticates successfully and considers as a trusted entity, and sends an authentication success message, ; | | (15) | ELSE send authentication failure message, ; | | (16) | END IF | | (17) | END |
|