Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment

被引:94
作者
Mandal, Shobhan [1 ,2 ]
Bera, Basudeb [1 ]
Sutrala, Anil Kumar [3 ]
Das, Ashok Kumar [1 ]
Choo, Kim-Kwang Raymond [4 ]
Park, Youngho [5 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] Huawei Technol, Bengaluru, India
[3] CA Technol, Hyderabad 500032, India
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[5] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 04期
基金
新加坡国家研究基金会; 美国国家科学基金会;
关键词
Automated validation of Internet security protocols and application (AVISPA); Internet of Things (IoT); key agreement; security; signcryption; user access control; KEY EXCHANGE; AUTHENTICATION PROTOCOL; INDUSTRIAL INTERNET; SECURITY; BIOMETRICS; PRIVACY;
D O I
10.1109/JIOT.2020.2966242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication, and revocation of a registered legitimate user to access real-time information and/or service directly from the IoT devices. To complement the existing literature, we design a new three-factor certificateless-signcryption-based user access control for the IoT environment (CSUAC-IoT). Specifically, in our scheme, a user U's password, personal biometrics, and mobile device are used as the three authentication factors. By executing the login and access control phase of CSUAC-IoT, a registered user (U) and a designated smart device (Si) can authorize and authenticate mutually via the trusted gateway node (GN) in a particular cell of the IoT environment. In our setting, the environment is partitioned into disjoint cells, and each cell will contain a certain number of IoT devices along with a GN. With the established session key between U and Si, both entities can then communicate securely. In addition, CSUAC-IoT supports new IoT devices deployment, user revocation, and password/biometric update functionality features. We prove the security of CSUAC-IoT under the real-or-random (ROR) model, and demonstrate that it can resist several common attacks found in a typical IoT environment using the AVISPA tool. A comparative analysis also reveals that CSUAC-IoT achieves better tradeoff for security and functionality, and computational and communication costs, in comparison to five other competing approaches.
引用
收藏
页码:3184 / 3197
页数:14
相关论文
共 36 条
  • [1] Abadi M, 2009, LECT NOTES COMPUT SC, V5643, P35, DOI 10.1007/978-3-642-02658-4_5
  • [2] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [3] [Anonymous], [No title captured]
  • [4] [Anonymous], 2017, INFORM MATTERS BUSIN
  • [5] [Anonymous], [No title captured]
  • [6] AVISPA, 2019, AUT VAL INT SEC PROT
  • [7] A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Srinivas, Jangirala
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8739 - 8752
  • [8] Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
  • [9] Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
  • [10] SDTE: A Secure Blockchain-Based Data Trading Ecosystem
    Dai, Weiqi
    Dai, Chunkai
    Choo, Kim-Kwang Raymond
    Cui, Changze
    Zou, Deiqing
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 725 - 737