ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment

作者: Bander A. Alzahrani , Shehzad Ashraf Chaudhry , Ahmed Barnawi , Wenjing Xiao , Min Chen

DOI: 10.1007/S12652-020-02349-5

关键词:

摘要: In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372 ) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a between user and smart device for IoT based networks. As per their claim, of provides known security features resist all attacks using only lightweight symmetric primitives. The analysis in this paper; however, shows that cannot complete normally. scheme, after sending request message may never receive response from device. This incorrectness results total applicability al.’s scheme. Moreover, it is also shown has weaknesses against stolen verifier attack. Then improved authentication deployments (ILAS-IoT) article. ILAS-IoT performs process correctly by increasing very little computation communication overheads. resists attacks, which evident formal informal analysis.

参考文章(56)
Jorge Granjal, Edmundo Monteiro, Jorge Sa Silva, Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 1294- 1312 ,(2015) , 10.1109/COMST.2015.2388550
Hui-Huang Hsu, Bo-Kai Chen, Chi-Yi Lin, Leonard Barolli, Makoto Takizawa, Danger warning via fuzzy inference in an RFID-deployed environment Journal of Ambient Intelligence and Humanized Computing. ,vol. 2, pp. 285- 292 ,(2011) , 10.1007/S12652-011-0047-1
Debiao He, Neeraj Kumar, Muhammad Khan, Jong-hyouk Lee, Anonymous two-factor authentication for consumer roaming service in global mobility networks IEEE Transactions on Consumer Electronics. ,vol. 59, pp. 811- 817 ,(2013) , 10.1109/TCE.2013.6689693
Peng Zhang, Chuang Lin, Yixin Jiang, Yanfei Fan, Xuemin Shen, A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 2211- 2221 ,(2014) , 10.1109/TPDS.2013.161
Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen Chilamkurti, Seng-Soo Yeo, Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks Multimedia Systems. ,vol. 21, pp. 49- 60 ,(2015) , 10.1007/S00530-013-0346-9
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang, An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks Wireless Personal Communications. ,vol. 77, pp. 1489- 1506 ,(2014) , 10.1007/S11277-013-1594-X
Luigi Atzori, Antonio Iera, Giacomo Morabito, The Internet of Things: A survey Computer Networks. ,vol. 54, pp. 2787- 2805 ,(2010) , 10.1016/J.COMNET.2010.05.010
T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computers. ,vol. 51, pp. 541- 552 ,(2002) , 10.1109/TC.2002.1004593