A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems

被引:71
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Yahya, Khalid [2 ]
Al-Turjman, Fadi [3 ,4 ]
Yang, Ming-Hour [5 ]
机构
[1] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[2] Istanbul Gelisim Univ, Dept Mechatron Engn, Fac Engn & Architecture, TR-34310 Istanbul, Turkey
[3] Near East Univ, Dept Artificial Intelligence Engn, TR-99138 Nicosia, Turkey
[4] Near East Univ, Res Ctr & IoT, TR-99138 Nicosia, Turkey
[5] Chung Yuan Christian Univ, Dept Informat & Comp Engn, Taoyuan 32023, Taiwan
关键词
Access control; Authentication; Internet of Things; Reliability; Cloud computing; Licenses; Device access control; device impersonation; forged message; IoT access; reliability; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; INTERNET; PRIVACY; MANAGEMENT; EFFICIENT; DESIGN;
D O I
10.1109/ACCESS.2020.3012121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure the reliability through secure communication among two IoT devices without mediation of intermediate agent. Mainly, it requires twofold strategy involving the authentication of each other and session key establishment. Quite recently, in 2019, Das et al. proposed a certificate based lightweight access control and key agreement scheme for IoT devices (LACKA-IoT) to ensure smooth and secure access control and claimed LACKA-IoT to withstand the several attacks. Specifically, it is claimed that LACKA-IoT can resist device impersonation and man in middle attacks. However, the proof in this article refutes their claim and it is shown here, that LACKA-IoT is insecure against both device impersonation and man in middle attacks. An adversary just by using public parameters and by listening the communication channel can impersonate any device. Moreover, the same can also launch successful man in middle attack using public parameters and listened messages from public channel. An improved protocol iLACKA-IoT is then proposed in the paper. The iLACKA-IoT provides resistance against various types of threats and provides the required level of security, for evidence both formal validation through random or real (ROR) model as well as the informal validation through discussion on attack resilience is provided. The iLACKA-IoT is not only better in security but also provides performance efficiency as compared with LACKA-IoT and related schemes.
引用
收藏
页码:139244 / 139254
页数:11
相关论文
共 50 条
  • [41] Fine-grained data access control with attribute-hiding policy for cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Ni, Jianbing
    Rong, Hong
    Xian, Ming
    Shen, Xuemin
    COMPUTER NETWORKS, 2019, 153 : 1 - 10
  • [42] Reliable service availability and access control method for cloud assisted IOT communications
    Kousalya, A.
    Sakthidasan, Krishnan
    Latha, A.
    WIRELESS NETWORKS, 2021, 27 (02) : 881 - 892
  • [43] SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-side Data Deduplication
    Islam, Tariqul
    Mistareehi, Hassan
    Manivannan, D.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [44] SUACC-IoT: secure unified authentication and access control system based on capability for IoT
    Sivaselvan, N.
    Bhat, K. Vivekananda
    Rajarajan, Muttukrishnan
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (04): : 2409 - 2428
  • [45] An anonymous device to device access control based on secure certificate for internet of medical things systems
    Chaudhry, Shehzad Ashraf
    Irshad, Azeem
    Nebhen, Jamel
    Bashir, Ali Kashif
    Moustafa, Nour
    Al-Otaibi, Yasser D.
    Bin Zikria, Yousaf
    SUSTAINABLE CITIES AND SOCIETY, 2021, 75
  • [46] ECCbAS: An ECC based authentication scheme for healthcare IoT systems
    Servati, Mohammad Reza
    Safkhani, Masoumeh
    PERVASIVE AND MOBILE COMPUTING, 2023, 90
  • [47] Secure Data Sharing Scheme Based on Dual Attribute Conversion for Cloud-Assisted IoT
    Tan, Zuowen
    Chen, Yanliang
    Yu, Mengjiang
    Jiao, Jintao
    Cao, Faxin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33577 - 33591
  • [48] PUF-based user access control scheme for IoT environment
    Kumar, Devender
    Pachigolla, Sai Kishore
    Manhas, Shubham Singh
    Rawat, Karan
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2023, 44 (07) : 1347 - 1364
  • [49] Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Yannam, Animi Reddy
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2019, 7 : 55382 - 55397
  • [50] A secure and reliable transmission scheme for low loss high performance wireless communication system based on IoT
    Niu, Xueting
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,