Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT

被引:0
作者
Park, Kisung [1 ]
Kim, Myeonghyun [2 ]
Park, Youngho [3 ]
机构
[1] Gachon Univ, Dept Comp Engn Smart Secur, Seongnam 13120, South Korea
[2] Elect & Telecommun Res Inst, Syst Secur Res Sect, Daejeon 34129, South Korea
[3] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
关键词
security analysis; Internet of Things; security attacks; session key security; PROTOCOL;
D O I
10.3390/s25010237
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. The previous work in "Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT" proposed a novel AKA scheme for secure IoT environments. They claimed their protocol offers comprehensive security features, guarding against numerous potential flaws while achieving session key security. However, this paper demonstrates through logical and mathematical analyses that the previous work is vulnerable to various attacks. We conducted a security analysis using the extended Canetti and Krawczyk (eCK) model, which is widely employed in security evaluations. This model considers scenarios where an attacker has complete control over the network, including the ability to intercept, modify, and delete messages, while also accounting for the potential exposure of ephemeral private keys. Furthermore, we show that their scheme fails to meet critical security requirements and relies on flawed security assumptions. We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments.
引用
收藏
页数:17
相关论文
共 34 条
[1]   A Secure and Efficient Key Establishment Scheme for Communications of Smart Meters and Service Providers in Smart Grid [J].
Abbasinezhad-Mood, Dariush ;
Ostad-Sharif, Arezou ;
Nikooghadam, Morteza ;
Mazinani, Sayyed Majid .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) :1495-1502
[2]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[3]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[4]   PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET [J].
Awais, Syed Muhammad ;
Yucheng, Wu ;
Mahmood, Khalid ;
Akram, Muhammad Wahid ;
Hussain, Shafiq ;
Das, Ashok Kumar ;
Park, Youngho .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (05) :6727-6739
[5]   An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid [J].
Baruah, Barnana ;
Dhal, Subhasish .
2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, :447-455
[6]   A deep recommendation model of cross-grained sentiments of user reviews and ratings [J].
Cai, Yao ;
Ke, Weimao ;
Cui, Eric ;
Yu, Fei .
INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (02)
[7]   A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure [J].
Chaudhry, Shehzad Ashraf ;
Nebhan, Jamel ;
Yahya, Khalid ;
Al-Turjman, Fadi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) :5000-5006
[8]   ECC-Based Authenticated Key Agreement Protocol for Industrial Control System [J].
Chen, Yanru ;
Yin, Fengming ;
Hu, Shunfang ;
Sun, Limin ;
Li, Yang ;
Xing, Bin ;
Chen, Liangyin ;
Guo, Bing .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) :4688-4697
[9]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[10]  
Eisenbarth T, 2008, LECT NOTES COMPUT SC, V5157, P203, DOI 10.1007/978-3-540-85174-5_12