A Secure Authentication Protocol for IoT-WLAN Using EAP Framework

被引:0
作者
Yadav, Awaneesh Kumar [1 ]
Misra, Manoj [1 ]
Pandey, Pradumn Kumar [1 ]
Ranaweera, Pasika [2 ]
Liyanage, Madhusanka [2 ]
Kumar, Neeraj [3 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
[2] Univ Collage Dublin, Sch Comp Sci, Dublin D02 PN40, Ireland
[3] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, India
基金
爱尔兰科学基金会;
关键词
Authentication; Protocols; Wireless LAN; Security; Protection; Internet of Things; Servers; extensible authentication protocol (EAP); formal verification; network security; wireless local area network (WLAN); EFFICIENT; SCHEME;
D O I
10.1109/TDSC.2024.3388467
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The plethora of Internet of Things (IoT) devices and their diversified requirements have opted to design security mechanisms that cover all major security requirements. Wireless Local Area Networks (WLANs) is the most common network domains where IoT devices are launched, particularly because of its easy availability. Security, in other words authentication however, remains to be a major constriction for IoT-WLAN deployments. Though there are IoT based authentication protocols prevailing, such protocols are either prone to threats such as perfect forward secrecy violations, insider with database access attack, traceability attack, stolen device attack, ephemeral secret leakage, or they consume excessive computational and communication resources that result in an unprecedented burden for the IoT system. This article presents an Extensible Authentication Protocol (EAP) based mechanism for IoT devices deployed in a WLAN that addresses the above security issues and achieves cost-effectiveness. Validation follows an informal and formal approaches (using GNY and BAN logic, and Scyther verification tool) for the proposed protocol, demonstrating its robustness. Our performance analysis shows that the proposed protocol is lightweight and more secure in contrast to the state-of-the-art solutions. In addition, performance of the proposed protocol subjected to unknown attacks is investigated, which deduces that the proposed protocol has less overhead under unknown attacks than its competitors. A prototype of the protocol has been developed to demonstrate its feasibility and accuracy.
引用
收藏
页码:49 / 65
页数:17
相关论文
共 59 条
  • [1] Aboba B., 2004, Extensible Authentication Protocol (EAP)
  • [2] Andersson H., 2002, Protected EAP protocol (PEAP)
  • [3] Asokan N., 2003, Security Protocols. 11th International Workshop. Revised Selected Papers (Lecture Notes in Computer Science Vol. 3364), P28
  • [4] Aura T., 2000, INT WORKSHOP SECURIT, P170, DOI DOI 10.1007/3-540-44810-122
  • [5] Baruah B., 2020, P 2020 11 INT C COMP, P1
  • [6] Bersani F., 2007, The EAP-PSK protocol: A pre-shared key extensible authentication protocol (EAP) method
  • [7] Blunk L., 1998, PPP Extensible Authentication Protocol (EAP)
  • [8] Braeken A., 2020, P 5 INT C CLOUD COMP, P1
  • [9] Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
    Braeken, An
    [J]. COMPUTER NETWORKS, 2020, 181
  • [10] Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks
    Braeken, An
    Liyanage, Madhusanka
    Kumar, Pardeep
    Murphy, John
    [J]. IEEE ACCESS, 2019, 7 : 64040 - 64052