Affiliation:
1. Department of Computer Science and Engineering University of Dhaka Dhaka Bangladesh
Abstract
AbstractThe advent of the Internet of Things (IoT) enables different customized services to ease the day‐to‐day life activities of users by utilizing information attained through the internet connectivity of low‐powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One‐Time Password (OTP)‐based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.
Publisher
Institution of Engineering and Technology (IET)
Subject
Control and Optimization,Management Science and Operations Research,Computer Networks and Communications
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. KESIC: Kerberos Extensions for Smart, IoT and CPS Devices;2024 33rd International Conference on Computer Communications and Networks (ICCCN);2024-07-29
2. A literature review on V2X communications security: Foundation, solutions, status, and future;IET Communications;2024-06-14
3. Exploring the Use of Symmetric Encryption for Remote User-Authentication in Wireless Networks;2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2023-12-29