A replay-attack resistant Authentication Scheme for the Internet of Things

被引:27
作者
Feng, Yuxiang [1 ]
Wang, Wenhao [1 ]
Weng, Yukai [1 ]
Zhang, Huanming [1 ]
机构
[1] South China Univ Technol, Sch Software Engn, Guangzhou, Guangdong, Peoples R China
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1 | 2017年
关键词
Internet of Things (IoT); Authentication; Hash function; replay attack; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WIRELESS; SECURITY; CRYPTANALYSIS; PROTOCOL;
D O I
10.1109/CSE-EUC.2017.101
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is the current technological revolution which can upgrade the current Internet environment into a more pervasive and ubiquitous world. Due to the distributed nature and the limited hardware capabilities of IoT, a lightweight authentication scheme is necessary. A certain number of lightweight user authentication schemes suit to the IoT environment had been proposed in recent years. However, these schemes mostly use the timestamp mechanism to resist the replay attack which is infeasible in IoT environment. In this paper, we propose a user authentication scheme based on improved challenge-response mechanism to resist replay attack in which an efficient mutual user authentication and a secure session key agreement are achieved. The performance and security analysis shows that our proposed scheme has a higher security level and is still highly efficient.
引用
收藏
页码:541 / 547
页数:7
相关论文
共 22 条
[1]   An end-to-end secure key management protocol for e-health applications [J].
Abdmeziem, Mohammed Riyadh ;
Tandjaoui, Djamel .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 :184-197
[2]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[5]   A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks [J].
Chen, Huifang ;
Ge, Linlin ;
Xie, Lei .
SENSORS, 2015, 15 (07) :17057-17075
[6]   A dynamic password-based user authentication scheme for hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sharma, Pranay ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) :1646-1656
[7]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[8]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[9]   Security of the Internet of Things: perspectives and challenges [J].
Jing, Qi ;
Vasilakos, Athanasios V. ;
Wan, Jiafu ;
Lu, Jingwei ;
Qiu, Dechao .
WIRELESS NETWORKS, 2014, 20 (08) :2481-2501
[10]   Securing the Internet of Things: A Standardization Perspective [J].
Keoh, Sye Loong ;
Kumar, Sandeep S. ;
Tschofenig, Hannes .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03) :265-275