New Enhanced Authentication Protocol for Internet of Things

被引:68
|
作者
Azrour, Mourade [1 ]
Mabrouki, Jamal [2 ]
Guezzaz, Azedine [3 ]
Farhaoui, Yousef [1 ]
机构
[1] Moulay Ismail Univ, Fac Sci & Tech, Dept Comp Sci, IDMS Team, Errachidia 52000, Morocco
[2] Mohammed V Univ Rabat, Lab Spect Mol Modeling Mat Nanomat Water & Enviro, CERNE2D, Fac Sci, Rabat 10000, Morocco
[3] Cadi Ayyad Univ, High Sch Technol, Dept Comp Sci & Math, Marrakech 40000, Morocco
来源
BIG DATA MINING AND ANALYTICS | 2021年 / 4卷 / 01期
关键词
authetication; Internet of Things (IoT); sensor; security; authorization; WIRELESS SENSOR NETWORKS; SCHEME; CHALLENGES; SECURE; IOT;
D O I
10.26599/BDMA.2020.9020010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user's data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [31] A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things
    Badhib, Arwa
    Alshehri, Suhair
    Cherif, Asma
    IEEE ACCESS, 2021, 9 : 124768 - 124792
  • [32] An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things
    Jang, Sunggyun
    Lim, Ducsun
    Kang, Jinyeong
    Joe, Inwhee
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (04) : 1681 - 1695
  • [33] LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things
    Chen, Chien-Ming
    Chen, Zhaoting
    Kumari, Saru
    Lin, Meng-Chang
    SENSORS, 2022, 22 (14)
  • [34] Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
    Safkhani, Masoumeh
    Bagheri, Nasour
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (08): : 3579 - 3585
  • [35] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [36] Authentication and Authorization for the Internet of Things
    Kim, Hokeun
    Lee, Edward A.
    IT PROFESSIONAL, 2017, 19 (05) : 27 - 33
  • [37] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [38] On the Authentication of Devices in the Internet of Things
    Sharaf-Dabbagh, Yaman
    Saad, Walid
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,
  • [39] Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
    Gong, Xiang
    Feng, Tao
    SENSORS, 2022, 22 (19)
  • [40] AN AUTHENTICATION TECHNIQUE BASED ON OAUTH 2.0 PROTOCOL FOR INTERNET OF THINGS (IOT) NETWORK
    Khan, Jalaluddin
    Li, Jian Ping
    Ali, Ikram
    Parveen, Shadma
    Khan, Ghufran Ahmad
    Khalil, Mudassir
    Khan, Asif
    Ul Haq, Amin
    Shahid, Mohammad
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 160 - 165