4.6 Article

Toward Designing a Secure Authentication Protocol for IoT Environments

Journal

SUSTAINABILITY
Volume 15, Issue 7, Pages -

Publisher

MDPI
DOI: 10.3390/su15075934

Keywords

internet of things; security; authentication; key agreement; multi-factor; smart-card; hash function; insider attacker; key compromised impersonation; key recovery

Ask authors/readers for more resources

An authentication protocol for secure data transmission in an IoT subsystem is proposed, but it has non-ideal security properties, vulnerability to insider attackers, and lacks perfect forward secrecy. The protocol is redesigned to withstand these attacks with only a 15.5% increase in computational cost.
Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the designers presented the first security analysis of the proposed protocol, that protocol has not been independently analyzed by third-party researchers, to the best of our knowledge. On the other hand, it is generally agreed that no cryptosystem should be used in a practical application unless its security has been verified through security analysis by third parties extensively, which is addressed in this paper. Although it is an efficient protocol by design compared to other related schemes, our security analysis identifies the non-ideal properties of this protocol. More specifically, we show that this protocol does not provide perfect forward secrecy. In addition, we show that it is vulnerable to an insider attacker, and an active insider adversary can successfully recover the shared keys between the protocol's entities. In addition, such an adversary can impersonate the remote server to the user and vice versa. Next, the adversary can trace the target user using the extracted information. Finally, we redesign the protocol such that the enhanced protocol can withstand all the aforementioned attacks. The overhead of the proposed protocol compared to its predecessor is only 15.5% in terms of computational cost.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available