A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems

被引:71
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Yahya, Khalid [2 ]
Al-Turjman, Fadi [3 ,4 ]
Yang, Ming-Hour [5 ]
机构
[1] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[2] Istanbul Gelisim Univ, Dept Mechatron Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[3] Near East Univ, Dept Artificial Intelligence Engn, TR-99138 Nicosia, Turkey
[4] Near East Univ, Res Ctr & IoT, TR-99138 Nicosia, Turkey
[5] Chung Yuan Christian Univ, Dept Informat & Comp Engn, Taoyuan 32023, Taiwan
关键词
Access control; Authentication; Internet of Things; Reliability; Cloud computing; Licenses; Device access control; device impersonation; forged message; IoT access; reliability; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; INTERNET; PRIVACY; MANAGEMENT; EFFICIENT; DESIGN;
D O I
10.1109/ACCESS.2020.3012121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure the reliability through secure communication among two IoT devices without mediation of intermediate agent. Mainly, it requires twofold strategy involving the authentication of each other and session key establishment. Quite recently, in 2019, Das et al. proposed a certificate based lightweight access control and key agreement scheme for IoT devices (LACKA-IoT) to ensure smooth and secure access control and claimed LACKA-IoT to withstand the several attacks. Specifically, it is claimed that LACKA-IoT can resist device impersonation and man in middle attacks. However, the proof in this article refutes their claim and it is shown here, that LACKA-IoT is insecure against both device impersonation and man in middle attacks. An adversary just by using public parameters and by listening the communication channel can impersonate any device. Moreover, the same can also launch successful man in middle attack using public parameters and listened messages from public channel. An improved protocol iLACKA-IoT is then proposed in the paper. The iLACKA-IoT provides resistance against various types of threats and provides the required level of security, for evidence both formal validation through random or real (ROR) model as well as the informal validation through discussion on attack resilience is provided. The iLACKA-IoT is not only better in security but also provides performance efficiency as compared with LACKA-IoT and related schemes.
引用
收藏
页码:139244 / 139254
页数:11
相关论文
共 50 条
  • [21] An Enhanced Reliable Access Scheme for Massive IoT Applications in Ubiquitous IoT Systems
    Peng, Yuhuai
    Shi, Yan
    Wang, Chenlu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [22] A New Scalable and Secure Access Control Scheme Using Blockchain Technology for IoT
    Sivaselvan, N.
    Bhat, K. Vivekananda
    Rajarajan, Muttukrishnan
    Das, Ashok Kumar
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 2957 - 2974
  • [23] An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
    Martinez-Pelaez, Rafael
    Toral-Cruz, Homero
    Parra-Michel, Jorge R.
    Garcia, Vicente
    Mena, Luis J.
    Felix, Vanessa G.
    Ochoa-Brust, Alberto
    SENSORS, 2019, 19 (09)
  • [24] Secure and scalable access control protocol for IoT environment
    Iqbal, Ummer
    Mir, Ajaz Hussain
    INTERNET OF THINGS, 2020, 12
  • [25] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Masud, Mehedi
    Gaba, Gurjot Singh
    Choudhary, Karanjeet
    Alroobaea, Roobaea
    Hossain, M. Shamim
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3043 - 3057
  • [26] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12) : 6428 - 6453
  • [27] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020
  • [28] Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
    Luo, Ming
    Luo, Yi
    Wan, Yuwei
    Wang, Ze
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [29] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Tzer-Shyong Chen
    Chia-Hui Liu
    Tzer-Long Chen
    Chin-Sheng Chen
    Jian-Guo Bau
    Tzu-Ching Lin
    Journal of Medical Systems, 2012, 36 : 4005 - 4020
  • [30] Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment
    Alshehri, Suhair
    Bamasaq, Omaimah
    Alghazzawi, Daniyal
    Jamjoom, Arwa
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (05) : 4239 - 4256