Secure Multifactor Remote Access User Authentication Framework for IoT Networks

被引:6
作者
Alshahrani, Mohammed Mujib [1 ]
机构
[1] Univ Bisha, Coll Comp & Informat Technol, Bisha, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 03期
关键词
Internet of things; threats; smart building; attacks; remote access; authentication; smart buildings;
D O I
10.32604/cmc.2021.015310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The term IoT refers to the interconnection and exchange of data among devices/sensors. IoT devices are often small, low cost, and have limited resources. The IoT issues and challenges are growing increasingly. Security and privacy issues are among the most important concerns in IoT applications, such as smart buildings. Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks, where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel. Thus, remote cybersecurity attacks are a significant threat. Emerging applications in smart environments such as smart buildings require remote access for both users and resources. Since the user/building communication channel is insecure, a lightweight and secure authentication protocol is required. In this paper, we propose a new secure remote user mutual authentication protocol based on transitory identities and multi-factor authentication for IoT smart building environment. The protocol ensures that only legitimate users can authenticate with smart building controllers in an anonymous, unlinkable, and untraceable manner. The protocol also avoids clock synchronization problem and can resist quantum computing attacks. The security of the protocol is evaluated using two different methods: (1) informal analysis; (2) model check using the automated validation of internet security protocols and applications (AVISPA) toolkit. The communication overhead and computational cost of the proposed are analyzed. The security and performance analysis show that our protocol is secure and efficient.
引用
收藏
页码:3235 / 3254
页数:20
相关论文
共 19 条
[1]   Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain [J].
Alshahrani, Mohammed ;
Traore, Issa .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 :156-175
[2]  
[Anonymous], 2001, LECT NOTECOMPUTER
[3]  
[Anonymous], 2008, P 41 ANN HAW INT C S
[4]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[5]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[6]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[7]   A novel secure key paring protocol for RF4CE ubiquitous smart home systems [J].
Han, Kyusuk ;
Kim, Jangseong ;
Shon, Taeshik ;
Ko, Daesik .
PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) :945-949
[8]  
Kay K. M., 2016, NIST DRAFT NISTIR, P1
[9]   DDoS in the IoT: Mirai and Other Botnets [J].
Kolias, Constantinos ;
Kambourakis, Georgios ;
Stavrou, Angelos ;
Voas, Jeffrey .
COMPUTER, 2017, 50 (07) :80-84
[10]   Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments [J].
Kumar, Pardeep ;
Gurtov, Andrei ;
Iinatti, Jari ;
Ylianttila, Mika ;
Sain, Mangal .
IEEE SENSORS JOURNAL, 2016, 16 (01) :254-264