A multi-attack resilient lightweight IoT authentication scheme

被引:25
作者
Adeel, Adil [1 ]
Ali, Mazhar [1 ]
Khan, Abdul Nasir [1 ]
Khalid, Tauqeer [1 ]
Rehman, Faisal [1 ]
Jararweh, Yaser [2 ]
Shuja, Junaid [1 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Abbottabad Campus, Abbottabad 22060, Pakistan
[2] Jordan Univ Sci & Technol, Dept Comp Sci, Irbid, Jordan
关键词
PROTOCOL; INTERNET; SECURITY; THINGS; PRIVACY;
D O I
10.1002/ett.3676
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Majority of the devices in the Internet of Things (IoT) are deployed in an environment that is susceptible to cyber-attacks. Due to the resource-constraint nature of IoT, it is very hard to meet the security challenges that arise due to the deployment of IoT devices in the unsecure environment. In this context, the authentication of IoT devices is one of the core challenges. Many protocols have been designed to address and overcome the security issues that stem from the authentication failure. However, many of these protocols are designed using the complex cryptographic techniques that may not be supported by IoT devices. In this paper, we propose a lightweight and secure mutual authentication scheme for resource constraint IoT devices. The proposed scheme is robust against cyber-attacks, such as impersonation, modification, session key disclosure, and eavesdropping attacks. The security of the proposed scheme is formally tested using the Automated Validation of Internet Security Protocols and Applications tool and found the scheme to be secure in the Dolev-Yao attack model. Moreover, the performance features such as communication overhead, computation time, and the turnaround time of the proposed scheme are evaluated and compared with the recent schemes of same category, where the proposed scheme shows a balance of performance without compromising the security features.
引用
收藏
页数:15
相关论文
共 26 条
  • [1] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [2] Fog Computing for the Internet of Things: Security and Privacy Issues
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Cheng, Xiuzhen
    [J]. IEEE INTERNET COMPUTING, 2017, 21 (02) : 34 - 42
  • [3] Anusha A., 2017, 2017 INT C REC TREND
  • [4] Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey
    Chen, Liang
    Thombre, Sarang
    Jarvinen, Kimmo
    Lohan, Elena Simona
    Alen-Savikko, Anette
    Leppakoski, Helena
    Bhuiyan, M. Zahidul H.
    Bu-Pasha, Shakila
    Ferrara, Giorgia Nunzia
    Honkala, Salomon
    Lindqvist, Jenna
    Ruotsalainen, Laura
    Korpisaari, Paivi
    Kuusniemi, Heidi
    [J]. IEEE ACCESS, 2017, 5 : 8956 - 8977
  • [5] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [6] A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
    Esfahani, Alireza
    Mantas, Georgios
    Matischek, Rainer
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    Bicaku, Ani
    Maksuti, Silia
    Tauber, Markus G.
    Schmittner, Christoph
    Bastos, Joaquim
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 288 - 296
  • [7] Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
    Fan, Kai
    Gong, Yuanyuan
    Liang, Chen
    Li, Hui
    Yang, Yintang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3095 - 3104
  • [8] Garg V., 2017, INT C INF SYST SEC
  • [9] Hu C., 2018, INT C WIR ALG SYST A
  • [10] Hwang I., 2017, 2017 INT C PLATF TEC, DOI [10.1109/it-dreps.2017.8277803, DOI 10.1109/IT-DREPS.2017.8277803]