Research Article
Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network
Algorithm 1
Authentication protocol under normal circumstances.
(1) | //INPUT: The excitation response pairs generated by PUF | (2) | //OUTPUT: Authentication success/failure message | (3) | BEGIN | (4) | Execute butterfly seed generation algorithm to generate and key , ; | (5) | and sensor nodes simultaneously execute pseudo-random sequence generator to generate ; | (6) | The sensor node calculates the value of by , and then sends it to ; | (7) | reads the database to get , and calculates by ; | (8) | IF the error between and is within the acceptable range, ; | (9) | THEN authenticates the sensor node successfully, considers the sensor node to be a trusted entity, and sends authentication success message, ; | (10) | ELSE send authentication failure message, ; | (11) | calculates by and sends it to sensor node; | (12) | END IF | (13) | IF the error between and is within the acceptable range, ; | (14) | THEN the sensor node authenticates successfully and considers as a trusted entity, and sends an authentication success message, ; | (15) | ELSE send authentication failure message, ; | (16) | END IF | (17) | END |
|