Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things

被引:73
作者
Wang, Chenyu [1 ,2 ]
Wang, Ding [3 ,4 ,5 ]
Duan, Yihe [3 ,4 ,5 ]
Tao, Xiaofeng [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Coll Cyber Sci, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Res Ctr Mobile Network Technol, Beijing 100876, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
[5] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
基金
中国国家自然科学基金;
关键词
User authentication; Internet of Things; cloud computing; offline dictionary attack; KEY AGREEMENT SCHEME; INDUSTRIAL INTERNET; IOT; PROTOCOL; EXCHANGE; BIOMETRICS; NETWORKS; DESIGN;
D O I
10.1109/TIFS.2023.3272772
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the traditional IoT and is developing rapidly in such fields as smart grids and intelligent transportation. In a cloud-assisted IoT system, users can remotely control the IoT devices and send specific instructions to them. If the users' identities are not verified, adversaries can pretend as legitimate users to send fake and malicious instructions to IoT devices, thereby compromising the security of the entire system. Thus, a sound authentication mechanism is indispensable to ensure security. At the same time, it should be noted that a gateway may connect to massive IoT devices with the exponential growth of interconnected devices in a cloud-assisted IoT system. The efficiency of authentication schemes is easily impacted by the computation capability of the gateway. Recently, several schemes have been designed for cloud-assisted IoT systems, but they have problems of one kind or another, making them not suitable for cloud-assisted IoT systems. In this paper, we take a typical scheme (proposed at IEEE TDSC 2020) as an example to identify the common weaknesses and challenges of designing a user authentication scheme for cloud-assisted IoT systems. In addition, we propose a new secure user authentication scheme with lightweight computation on gateways. The proposed scheme provides secure access between remote users and IoT devices with many ideal attributions, such as forward secrecy and multi-factor security. Meanwhile, the security of this scheme is proved under the random-oracle model, heuristic analysis, the ProVerif tool, and BAN logic. Compared with ten state-of-the-art schemes in security and performance, the proposed scheme achieves all the listed twelve security requirements with minimum computation and storage costs on gateways.
引用
收藏
页码:2961 / 2976
页数:16
相关论文
共 53 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Shojafar, Mohammad ;
Peris-Lopez, Pedro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :410-424
[3]   A framework of adaptive interaction support in cloud-based internet of things (IoT) environment [J].
Alhakbani, Noura ;
Hassan, Mohammed Mehedi ;
Hossain, M. Anwar ;
Alnuem, Mohammed .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8729 :136-146
[4]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[5]  
Bagga P., 2023, CyberSecur. Appl., V1
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[7]   An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography [J].
Bhuarya, Pallavi ;
Chandrakar, Preeti ;
Ali, Rifaqat ;
Sharaff, Aakanksha .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (10)
[8]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[9]  
Boyd C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P240
[10]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13