4.6 Article

Toward Designing a Secure Authentication Protocol for IoT Environments

期刊

SUSTAINABILITY
卷 15, 期 7, 页码 -

出版社

MDPI
DOI: 10.3390/su15075934

关键词

internet of things; security; authentication; key agreement; multi-factor; smart-card; hash function; insider attacker; key compromised impersonation; key recovery

向作者/读者索取更多资源

An authentication protocol for secure data transmission in an IoT subsystem is proposed, but it has non-ideal security properties, vulnerability to insider attackers, and lacks perfect forward secrecy. The protocol is redesigned to withstand these attacks with only a 15.5% increase in computational cost.
Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the designers presented the first security analysis of the proposed protocol, that protocol has not been independently analyzed by third-party researchers, to the best of our knowledge. On the other hand, it is generally agreed that no cryptosystem should be used in a practical application unless its security has been verified through security analysis by third parties extensively, which is addressed in this paper. Although it is an efficient protocol by design compared to other related schemes, our security analysis identifies the non-ideal properties of this protocol. More specifically, we show that this protocol does not provide perfect forward secrecy. In addition, we show that it is vulnerable to an insider attacker, and an active insider adversary can successfully recover the shared keys between the protocol's entities. In addition, such an adversary can impersonate the remote server to the user and vice versa. Next, the adversary can trace the target user using the extracted information. Finally, we redesign the protocol such that the enhanced protocol can withstand all the aforementioned attacks. The overhead of the proposed protocol compared to its predecessor is only 15.5% in terms of computational cost.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据