A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments

被引:19
|
作者
Son, Seunghwan [1 ]
Park, Yohan [2 ]
Park, Youngho [1 ,3 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Keimyung Univ, Sch Comp Engn, Daegu 42601, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
mutual authentication; key agreement; lightweight; anonymity; IoT environment; BAN logic; ROR model; AVISPA simulation; KEY AGREEMENT PROTOCOL; PROVABLY SECURE; ACCESS-CONTROL; SCHEME; INTERNET; DESIGN; EXCHANGE; DRONES;
D O I
10.3390/su13169241
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The Internet of Things (IoT) is being applied to various environments such as telecare systems, smart homes, and intelligent transportation systems. The information generated from IoT devices is stored at remote servers, and external users authenticate to the server for requesting access to the stored data. In IoT environments, the authentication process is required to be conducted efficiently, and should be secure against various attacks and ensure user anonymity and untraceability to ensure sustainability of the network. However, many existing protocols proposed in IoT environments do not meet these requirements. Recently, Rajaram et al. proposed a paring-based user authentication scheme. We found that the Rajaram et al. scheme is vulnerable to various attacks such as offline password guessing, impersonation, privileged insider, and known session-specific temporary information attacks. Additionally, as their scheme uses bilinear pairing, it requires high computation and communication costs. In this study, we propose a novel authentication scheme that resolves these security problems. The proposed scheme uses only hash and exclusive-or operations to be applicable in IoT environments. We analyze the proposed protocol using informal analysis and formal analysis methods such as the BAN logic, real-or-random (ROR) model, and the AVISPA simulation, and we show that the proposed protocol has better security and performance compared with existing authentication protocols. Consequently, the proposed protocol is sustainable and suitable for real IoT environments.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Reconsidering a lightweight anonymous authentication protocol
    Chen, Chien-Ming
    Wang, King-Hang
    Fang, Weicheng
    Wu, Tsu-Yang
    Wang, Eric Ke
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 9 - 14
  • [22] A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
    Oh, JiHyeon
    Yu, SungJin
    Lee, JoonYoung
    Son, SeungHwan
    Kim, MyeongHyun
    Park, YoungHo
    [J]. SENSORS, 2021, 21 (04) : 1 - 24
  • [23] Lightweight, Anonymous and Mutual Authentication in IoT Infrastructure
    Janbabaei, Shadi
    Gharaee, Hossein
    Mohammadzadeh, Naser
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 162 - 166
  • [24] Anonymous and Lightweight Authentication for Secure Vehicular Networks
    Ying, Bidi
    Nayak, Amiya
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (12) : 10626 - 10636
  • [25] E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT
    Zeng, Xianjiao
    Xu, Guangquan
    Zheng, Xi
    Xiang, Yang
    Zhou, Wanlei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1506 - 1519
  • [26] A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
    Chen, Chien-Ming
    Liu, Shuangshuang
    Chaudhry, Shehzad Ashraf
    Chen, Yeh-Cheng
    Khan, Muhammad Asghar
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (01): : 307 - 329
  • [27] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    [J]. The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [28] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 13893 - 13914
  • [29] A User Anonymous Mutual Authentication Protocol
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Odelu, Vanga
    Khan, Muhammad Khurram
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4508 - 4528
  • [30] A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments
    Kumar, Manoj
    Verma, Harsh Kumar
    Sikka, Geeta
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (04)