A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments

被引:19
|
作者
Son, Seunghwan [1 ]
Park, Yohan [2 ]
Park, Youngho [1 ,3 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Keimyung Univ, Sch Comp Engn, Daegu 42601, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
基金
新加坡国家研究基金会;
关键词
mutual authentication; key agreement; lightweight; anonymity; IoT environment; BAN logic; ROR model; AVISPA simulation; KEY AGREEMENT PROTOCOL; PROVABLY SECURE; ACCESS-CONTROL; SCHEME; INTERNET; DESIGN; EXCHANGE; DRONES;
D O I
10.3390/su13169241
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The Internet of Things (IoT) is being applied to various environments such as telecare systems, smart homes, and intelligent transportation systems. The information generated from IoT devices is stored at remote servers, and external users authenticate to the server for requesting access to the stored data. In IoT environments, the authentication process is required to be conducted efficiently, and should be secure against various attacks and ensure user anonymity and untraceability to ensure sustainability of the network. However, many existing protocols proposed in IoT environments do not meet these requirements. Recently, Rajaram et al. proposed a paring-based user authentication scheme. We found that the Rajaram et al. scheme is vulnerable to various attacks such as offline password guessing, impersonation, privileged insider, and known session-specific temporary information attacks. Additionally, as their scheme uses bilinear pairing, it requires high computation and communication costs. In this study, we propose a novel authentication scheme that resolves these security problems. The proposed scheme uses only hash and exclusive-or operations to be applicable in IoT environments. We analyze the proposed protocol using informal analysis and formal analysis methods such as the BAN logic, real-or-random (ROR) model, and the AVISPA simulation, and we show that the proposed protocol has better security and performance compared with existing authentication protocols. Consequently, the proposed protocol is sustainable and suitable for real IoT environments.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] LAAP: Lightweight Anonymous Authentication Protocol for IoT Edge Devices Based on Elliptic Curve
    Zhu, Xinghui
    Ren, Zhong
    He, Ji
    Ren, Baoquan
    Zhao, Shuangrui
    Zhang, Pinchang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [32] Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function
    Wang, Hongyuan
    Meng, Jin
    Du, Xilong
    Cao, Tengfei
    Xie, Yong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [33] A secure and efficient three-factor authentication protocol for IoT environments
    Li, Yi
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 179
  • [34] Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol
    Oliver, S. Gladson
    Purusothaman, T.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 767 - 780
  • [35] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    [J]. INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [36] A Lightweight And Secure Authentication Protocol for WSN
    Sikarwar, Himani
    Das, Debasis
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 475 - 480
  • [37] A Secure and Lightweight Authentication Protocol for RFID
    Liu Cheng
    Lin Shenwen
    Li Yingbo
    Li Na
    Wang Xuren
    [J]. PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 317 - 320
  • [38] Towards Lightweight Anonymous Entity Authentication for IoT Applications
    Yang, Yanjiang
    Cai, Haibin
    Wei, Zhuo
    Lu, Haibing
    Choo, Kim-Kwang Raymond
    [J]. INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 265 - 280
  • [39] A LIGHTWEIGHT SYMMETRIC CRYPTOGRAPHY BASED USER AUTHENTICATION PROTOCOL FOR IOT BASED APPLICATIONS
    Reddy, A. Mahesh
    Gudivada, Durvasi
    Rao, M. Kameswara
    [J]. Scalable Computing, 2024, 25 (03): : 1647 - 1657
  • [40] A LIGHTWEIGHT SYMMETRIC CRYPTOGRAPHY BASED USER AUTHENTICATION PROTOCOL FOR IOT BASED APPLICATIONS
    Reddy, A. mahesh
    Gudivada, Durvasi
    Rao, M. kameswara
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (03): : 1647 - 1657