New Enhanced Authentication Protocol for Internet of Things

被引:74
作者
Azrour, Mourade [1 ]
Mabrouki, Jamal [2 ]
Guezzaz, Azedine [3 ]
Farhaoui, Yousef [1 ]
机构
[1] Moulay Ismail Univ, Fac Sci & Tech, Dept Comp Sci, IDMS Team, Errachidia 52000, Morocco
[2] Mohammed V Univ Rabat, Lab Spect Mol Modeling Mat Nanomat Water & Enviro, CERNE2D, Fac Sci, Rabat 10000, Morocco
[3] Cadi Ayyad Univ, High Sch Technol, Dept Comp Sci & Math, Marrakech 40000, Morocco
关键词
authetication; Internet of Things (IoT); sensor; security; authorization; WIRELESS SENSOR NETWORKS; SCHEME; CHALLENGES; SECURE; IOT;
D O I
10.26599/BDMA.2020.9020010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user's data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 42 条
[1]  
Abu Bakar N.A., 2019, Indones. J. Electr. Eng. Comput. Sci. (IJEECS), V15, P414, DOI DOI 10.11591/IJEECS.V15.I1.PP414-420
[2]  
Azrour M, 2019, STUD BIG DATA, V53, P67, DOI 10.1007/978-3-030-12048-1_9
[3]   Environmental monitoring using autonomous vehicles: a survey of recent searching techniques [J].
Bayat, Behzad ;
Crasta, Naveena ;
Crespi, Alessandro ;
Pascoal, Antonio M. ;
Ijspeert, Auke .
CURRENT OPINION IN BIOTECHNOLOGY, 2017, 45 :76-84
[4]  
Bayat M., 2019, Int. J. Netw. Secur., V21, P897
[5]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[6]  
Chawla N., 2020, Int J Recent Res Aspects, V7, P9
[7]  
Cremers C. J. F, SCYTHER TOOL VERIFIC, DOI [10.1007/978-3-540-70545-138, DOI 10.1007/978-3-540-70545-138]
[9]   Multi-factor user authentication scheme for IoT-based healthcare services [J].
Dhillon P.K. ;
Kalra S. .
Journal of Reliable Intelligent Environments, 2018, 4 (03) :141-160
[10]   A NETWORK ARCHITECTURE SOLUTION FOR EFFICIENT IOT WSN BACKHAULING: CHALLENGES AND OPPORTUNITIES [J].
Fantacci, Romano ;
Pecorella, Tommaso ;
Viti, Roberto ;
Carlini, Camillo .
IEEE WIRELESS COMMUNICATIONS, 2014, 21 (04) :113-119