An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things

被引:24
作者
Ahmed, Adel Ali [1 ]
Ahmed, Waleed Ali [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah 25729, Saudi Arabia
关键词
IoT; authentication; hash function; IOT; SECURE; ARCHITECTURE;
D O I
10.3390/s19173663
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart healthcare, smart transportation, etc. Due to the fact that the IoT devices have limited resources, the cybersecurity approaches that relied on complex and long processing cryptography are not a good fit for these constrained devices. Moreover, the current IoT systems experience critical security vulnerabilities that include identifying which devices were affected, what data or services were accessed or compromised, and which users were impacted. The cybersecurity challenge in IoT systems is to find a solution for handling the identity of the user, things/objects and devices in a secure manner. This paper proposes an effective multifactor authentication (CMA) solution based on robust combiners of the hash functions implemented in the IoT devices. The proposed CMA solution mitigates the authentication vulnerabilities of IoT and defends against several types of attacks. Also, it achieves multi-property robustness and preserves the collision-resistance, the pseudo-randomness, the message authentication code, and the one-wayness. It also ensures the integrity, authenticity and availability of sensed data for the legitimate IoT devices. The simulation results show that CMA outperforms the TOTP in term of the authentication failure rate. Moreover, the evaluation of CMA shows an acceptable QoS measurement in terms of computation time overhead, throughput, and packet loss ratio.
引用
收藏
页数:22
相关论文
共 31 条
[1]   Secure real-time routing protocol with load distribution in wireless sensor networks [J].
Ahmed, Adel Ali ;
Fisal, Norsheila Fisal .
SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) :839-859
[2]  
Alharbi T, 2015, C LOCAL COMPUT NETW, P502, DOI 10.1109/LCN.2015.7366363
[3]   Two-Factor Authentication for IoT With Location Information [J].
Aman, Muhammad Naveed ;
Basheer, Mohamed Haroon ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :3335-3351
[4]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[5]   RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning [J].
Chatterjee, Baibhab ;
Das, Debayan ;
Maity, Shovan ;
Sen, Shreyas .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :388-398
[6]   A Lightweight Continuous Authentication Protocol for the Internet of Things [J].
Chuang, Yo-Hsuan ;
Lo, Nai-Wei ;
Yang, Cheng-Ying ;
Tang, Ssu-Wei .
SENSORS, 2018, 18 (04)
[7]  
Ciampa M, 2015, SECURITY GUIDE NETWO, V5th ed.
[8]   IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios [J].
Cirani, Simone ;
Picone, Marco ;
Gonizzi, Pietro ;
Veltri, Luca ;
Ferrari, Gianluigi .
IEEE SENSORS JOURNAL, 2015, 15 (02) :1224-1234
[9]   From Micro to Macro IoT: Challenges and Solutions in the Integration of IEEE 802.15.4/802.11 and Sub-GHz Technologies [J].
Davoli, Luca ;
Belli, Laura ;
Cilfone, Antonio ;
Ferrari, Gianluigi .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02) :784-793
[10]   Multi-factor user authentication scheme for IoT-based healthcare services [J].
Dhillon P.K. ;
Kalra S. .
Journal of Reliable Intelligent Environments, 2018, 4 (03) :141-160