作者: Bander A. Alzahrani , Shehzad Ashraf Chaudhry , Ahmed Barnawi , Wenjing Xiao , Min Chen
DOI: 10.1007/S12652-020-02349-5
关键词:
摘要: In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372 ) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a between user and smart device for IoT based networks. As per their claim, of provides known security features resist all attacks using only lightweight symmetric primitives. The analysis in this paper; however, shows that cannot complete normally. scheme, after sending request message may never receive response from device. This incorrectness results total applicability al.’s scheme. Moreover, it is also shown has weaknesses against stolen verifier attack. Then improved authentication deployments (ILAS-IoT) article. ILAS-IoT performs process correctly by increasing very little computation communication overheads. resists attacks, which evident formal informal analysis.