A Multi-Stage Secure IoT Authentication Protocol

被引:0
|
作者
Alhusayni, Khalid [1 ]
Wazirali, Raniyah [1 ]
AlAkhras, Mousa [1 ,2 ]
Almasri, Marwah [1 ]
Alhazmi, Samah [1 ]
机构
[1] Saudi Elect Univ, Coll Comp & Informat, Riyadh 11673, Saudi Arabia
[2] Univ Jordan, King Abdullah II Sch Informat Technol, Amman 11942, Jordan
来源
关键词
Internet of Things (IoT); security; authentication; BAN logic; sensor networks; BODY SENSOR NETWORKS; SCHEME; INTERNET;
D O I
10.32604/csse.2023.028536
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect mil-lions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital inter-vention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Bur-rows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the pro-posed protocol to verify the formal security offered by the BAN logic.
引用
收藏
页码:459 / 481
页数:23
相关论文
共 50 条
  • [21] A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
    Oh, JiHyeon
    Yu, SungJin
    Lee, JoonYoung
    Son, SeungHwan
    Kim, MyeongHyun
    Park, YoungHo
    SENSORS, 2021, 21 (04) : 1 - 24
  • [22] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Bahaa Hussein Taher Algubili
    Neeraj Kumar
    Hongwei Lu
    Ali A. Yassin
    Rihab Boussada
    Alzahraa J. Mohammed
    Huiyu Liu
    Peer-to-Peer Networking and Applications, 2022, 15 : 2179 - 2198
  • [23] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Algubili, Bahaa Hussein Taher
    Kumar, Neeraj
    Lu, Hongwei
    Yassin, Ali A.
    Boussada, Rihab
    Mohammed, Alzahraa J.
    Liu, Huiyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (05) : 2179 - 2198
  • [24] An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
    Izza, Sarah
    Benssalah, Mustapha
    Drouiche, Karim
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [25] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [26] A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices
    Mahalat, Mahabub Hasan
    Saha, Shreya
    Mondal, Anindan
    Sen, Bibhash
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 183 - 187
  • [27] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [28] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [29] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [30] Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol
    Oliver, S. Gladson
    Purusothaman, T.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 767 - 780