User Authentication Scheme for Internet of Things Using Near-Field Communication

被引:1
作者
Alharbi, Muhammad H. [1 ]
Alhazmi, Omar H. [1 ]
机构
[1] Taibah Univ, Dept Comp Sci, Medina 30001, Saudi Arabia
关键词
NFC; authentication; IoT; user; lightweight cryptography; KEY AGREEMENT SCHEME; SECURITY;
D O I
10.1142/S0218539320400124
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the Internet of things (IoT), the user authentication process is becoming more critical with the growing number of the services provided by IoT. Securing access to these services by the user authentication process leads to high security to prevent any attack on the IoT network. The approach keeps the private information secured efficiently and ensuring that only authorized users can access this information. The proposed scheme uses only Chaskey hash function and XOR operation. The security analysis proves that it is immune to different types of attacks. Furthermore, the scheme is faster, lighter on resources and energy consumption compared to other existing schemes. Finally, we compare the proposed scheme to several other existing schemes on several aspects highlighting main differences.
引用
收藏
页数:35
相关论文
共 26 条
[1]   A robust mutual authentication protocol for WSN with multiple base-stations [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Obaidat, Mohammad S. .
AD HOC NETWORKS, 2018, 75-76 :1-18
[2]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[3]   A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques [J].
Chen, Lei ;
Wei, Fushan ;
Ma, Chuangui .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[4]  
Cheval V., PROVERIF CRYPTOGRAPH
[5]  
Choi Jongseok, 2016, SECURE IOT FRAMEWORK
[6]  
Cremers C., 2019, SCYTHER TOOL AUTOMAT
[7]   A robust anonymous biometric-based remote user authentication scheme using smart cards [J].
Das, Ashok Kumar ;
Goswami, Adrijit .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (02) :193-210
[8]   A lightweight biometrics based remote user authentication scheme for IoT services [J].
Dhillon, Parwinder Kaur ;
Kalra, Sheetal .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 :255-270
[9]   A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks [J].
Hsieh, Wen-Bin ;
Leu, Jenq-Shiou .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) :979-989
[10]  
Jing L., 2012, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, P588, DOI DOI 10.1109/ICDCSW.2012.23