Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

被引:53
作者
Ndibanje, Bruce [1 ]
Lee, Hoon-Jae [2 ]
Lee, Sang-Gon [2 ]
机构
[1] Dongseo Univ, Dept Ubiquitous IT, Grad Sch Design & IT, Pusan 617716, South Korea
[2] Dongseo Univ, Div Comp & Engn, Pusan 617716, South Korea
基金
新加坡国家研究基金会;
关键词
Internet of Things; wireless sensor networks; mutual authentication; access control; WIRELESS SENSOR NETWORKS; ELLIPTIC CURVE CRYPTOGRAPHY; KEY MANAGEMENT SCHEME; PRIVACY;
D O I
10.3390/s140814786
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
引用
收藏
页码:14786 / 14805
页数:20
相关论文
共 52 条
[1]  
Alomair B, 2010, I C DEPEND SYS NETWO, P1, DOI 10.1109/DSN.2010.5545008
[2]  
[Anonymous], GARTN HYP CYCL SPEC
[3]  
[Anonymous], 2006, INT J SENSOR NETWORK
[4]   Anonymous authentication protocol for GSM networks [J].
Department of Computer Engineering, Sharif University of Technology, Tehran, Iran .
Int. J. Secur. Netw., 2008, 1 (54-62) :54-62
[5]  
Ashton Kevin., 2009, That Internet of Things Thing
[6]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[7]   An algorithmic framework for robust access control in wireless sensor networks [J].
Benenson, Z ;
Gärtner, FC ;
Kesdogan, D .
PROCEEDINGS OF THE SECOND EUROPEAN WORKSHOP ON WIRELESS SENSOR NETWORKS, 2005, :158-165
[8]   A data-hiding technique with authentication, integration, and confidentiality for electronic patient records [J].
Chao, HM ;
Hsu, CM ;
Miaou, SG .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2002, 6 (01) :46-53
[9]   Code-Centric RFID System Based on Software Agent Intelligence [J].
Chen, Min ;
Gonzalez, Sergio ;
Zhang, Qian ;
Leung, Victor C. M. .
IEEE INTELLIGENT SYSTEMS, 2010, 25 (02) :12-19
[10]   An effective key management scheme for heterogeneous sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hslao-Hwa .
AD HOC NETWORKS, 2007, 5 (01) :24-34