Toward Designing a Secure Authentication Protocol for IoT Environments

Author:

Hosseinzadeh Mehdi123ORCID,Malik Mazhar Hussain4ORCID,Safkhani Masoumeh56ORCID,Bagheri Nasour67ORCID,Le Quynh Hoang12,Tightiz Lilia8ORCID,Mosavi Amir H.910ORCID

Affiliation:

1. Institute of Research and Development, Duy Tan University, Da Nang 550000, Vietnam

2. School of Medicine and Pharmacy, Duy Tan University, Da Nang 550000, Vietnam

3. Computer Science, University of Human Development, Sulaymaniyah 0778-6, Iraq

4. School of Computing and Creative Technologies College of Arts, Technology and Environment (CATE) University of the West of England Frenchay Campus, Coldharbour Lane, Bristol BS16 1QY, UK

5. Faculty of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran P.O. Box 16788-15811, Iran

6. School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran P.O. Box 19395-5746, Iran

7. Faculty of Electrical Engineering, Shahid Rajaee Teacher Training University, Tehran P.O. Box 16788-15811, Iran

8. School of Computing, Gachon University, 1342 Seongnamdaero, Seongnam 13120, Republic of Korea

9. John von Neumann Faculty of Informatics, Obuda University, 1034 Budapest, Hungary

10. Institute of the Information Society, University of Public Service, 1083 Budapest, Hungary

Abstract

Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the designers presented the first security analysis of the proposed protocol, that protocol has not been independently analyzed by third-party researchers, to the best of our knowledge. On the other hand, it is generally agreed that no cryptosystem should be used in a practical application unless its security has been verified through security analysis by third parties extensively, which is addressed in this paper. Although it is an efficient protocol by design compared to other related schemes, our security analysis identifies the non-ideal properties of this protocol. More specifically, we show that this protocol does not provide perfect forward secrecy. In addition, we show that it is vulnerable to an insider attacker, and an active insider adversary can successfully recover the shared keys between the protocol’s entities. In addition, such an adversary can impersonate the remote server to the user and vice versa. Next, the adversary can trace the target user using the extracted information. Finally, we redesign the protocol such that the enhanced protocol can withstand all the aforementioned attacks. The overhead of the proposed protocol compared to its predecessor is only 15.5% in terms of computational cost.

Publisher

MDPI AG

Subject

Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3