A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems

被引:71
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Yahya, Khalid [2 ]
Al-Turjman, Fadi [3 ,4 ]
Yang, Ming-Hour [5 ]
机构
[1] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[2] Istanbul Gelisim Univ, Dept Mechatron Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[3] Near East Univ, Dept Artificial Intelligence Engn, TR-99138 Nicosia, Turkey
[4] Near East Univ, Res Ctr & IoT, TR-99138 Nicosia, Turkey
[5] Chung Yuan Christian Univ, Dept Informat & Comp Engn, Taoyuan 32023, Taiwan
关键词
Access control; Authentication; Internet of Things; Reliability; Cloud computing; Licenses; Device access control; device impersonation; forged message; IoT access; reliability; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; INTERNET; PRIVACY; MANAGEMENT; EFFICIENT; DESIGN;
D O I
10.1109/ACCESS.2020.3012121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure the reliability through secure communication among two IoT devices without mediation of intermediate agent. Mainly, it requires twofold strategy involving the authentication of each other and session key establishment. Quite recently, in 2019, Das et al. proposed a certificate based lightweight access control and key agreement scheme for IoT devices (LACKA-IoT) to ensure smooth and secure access control and claimed LACKA-IoT to withstand the several attacks. Specifically, it is claimed that LACKA-IoT can resist device impersonation and man in middle attacks. However, the proof in this article refutes their claim and it is shown here, that LACKA-IoT is insecure against both device impersonation and man in middle attacks. An adversary just by using public parameters and by listening the communication channel can impersonate any device. Moreover, the same can also launch successful man in middle attack using public parameters and listened messages from public channel. An improved protocol iLACKA-IoT is then proposed in the paper. The iLACKA-IoT provides resistance against various types of threats and provides the required level of security, for evidence both formal validation through random or real (ROR) model as well as the informal validation through discussion on attack resilience is provided. The iLACKA-IoT is not only better in security but also provides performance efficiency as compared with LACKA-IoT and related schemes.
引用
收藏
页码:139244 / 139254
页数:11
相关论文
共 50 条
  • [31] Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
    Ju, Sieun
    Park, Yohan
    SENSORS, 2023, 23 (24)
  • [32] Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
    Shariq, Mohd
    Conti, Mauro
    Singh, Karan
    Lal, Chhagan
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    Masud, Mehedi
    COMPUTER NETWORKS, 2024, 252
  • [33] PSCLS: provably secure certificateless signature scheme for IoT device on cloud
    Vijay Kumar Yadav
    Nitish Andola
    Shekhar Verma
    S. Venkatesan
    The Journal of Supercomputing, 2023, 79 : 4962 - 4982
  • [34] Secure Data Sharing: Blockchain-Enabled Data Access Control Framework for IoT
    Wei, Xin
    Yan, Yong
    Guo, Shaoyong
    Qiu, Xuesong
    Qi, Feng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8143 - 8153
  • [35] A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Sangwoo
    Kwon, Hyeokchan
    Park, Youngho
    IEEE ACCESS, 2024, 12 : 154066 - 154079
  • [36] Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT
    Ameer, Safwa
    Benson, James
    Sandhu, Ravi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4032 - 4051
  • [37] Efficient and Secure Access Control for IoT-based Environmental Monitoring
    Aljahdali, Asia Othman
    Habibullah, Afnan
    Aljohani, Huda
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (05) : 11807 - 11815
  • [38] LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments
    Gupta, Daya Sagar
    Islam, Sk Hafizul
    Obaidat, Mohammad S.
    Karati, Arijit
    Sadoun, Balqies
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3620 - 3627
  • [39] Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment
    Sivaselvan, N.
    Bhat, Vivekananda K.
    Rajarajan, Muttukrishnan
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 323 - 330
  • [40] ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications
    Maitra, Tanmoy
    Obaidat, Mohammad S.
    Giri, Debasis
    Dutta, Subrata
    Dahal, Keshav
    IET NETWORKS, 2019, 8 (05) : 289 - 298