Toward Designing a Secure Authentication Protocol for IoT Environments
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hosseinzadeh, Mehdi | - |
dc.contributor.author | Malik, Mazhar Hussain | - |
dc.contributor.author | Safkhani, Masoumeh | - |
dc.contributor.author | Bagheri, Nasour | - |
dc.contributor.author | Le, Quynh Hoang | - |
dc.contributor.author | Tightiz, Lilia | - |
dc.contributor.author | Mosavi, Amir H. | - |
dc.date.accessioned | 2023-05-16T08:41:13Z | - |
dc.date.available | 2023-05-16T08:41:13Z | - |
dc.date.issued | 2023-04 | - |
dc.identifier.issn | 2071-1050 | - |
dc.identifier.issn | 2071-1050 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/87761 | - |
dc.description.abstract | Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the designers presented the first security analysis of the proposed protocol, that protocol has not been independently analyzed by third-party researchers, to the best of our knowledge. On the other hand, it is generally agreed that no cryptosystem should be used in a practical application unless its security has been verified through security analysis by third parties extensively, which is addressed in this paper. Although it is an efficient protocol by design compared to other related schemes, our security analysis identifies the non-ideal properties of this protocol. More specifically, we show that this protocol does not provide perfect forward secrecy. In addition, we show that it is vulnerable to an insider attacker, and an active insider adversary can successfully recover the shared keys between the protocol's entities. In addition, such an adversary can impersonate the remote server to the user and vice versa. Next, the adversary can trace the target user using the extracted information. Finally, we redesign the protocol such that the enhanced protocol can withstand all the aforementioned attacks. The overhead of the proposed protocol compared to its predecessor is only 15.5% in terms of computational cost. | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | MDPI | - |
dc.title | Toward Designing a Secure Authentication Protocol for IoT Environments | - |
dc.type | Article | - |
dc.identifier.wosid | 000970283500001 | - |
dc.identifier.doi | 10.3390/su15075934 | - |
dc.identifier.bibliographicCitation | SUSTAINABILITY, v.15, no.7 | - |
dc.description.isOpenAccess | Y | - |
dc.identifier.scopusid | 2-s2.0-85152782559 | - |
dc.citation.title | SUSTAINABILITY | - |
dc.citation.volume | 15 | - |
dc.citation.number | 7 | - |
dc.type.docType | Article | - |
dc.publisher.location | 스위스 | - |
dc.subject.keywordAuthor | internet of things | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | key agreement | - |
dc.subject.keywordAuthor | multi-factor | - |
dc.subject.keywordAuthor | smart-card | - |
dc.subject.keywordAuthor | hash function | - |
dc.subject.keywordAuthor | insider attacker | - |
dc.subject.keywordAuthor | key compromised impersonation | - |
dc.subject.keywordAuthor | key recovery | - |
dc.subject.keywordPlus | PRIVACY-PRESERVING AUTHENTICATION | - |
dc.subject.keywordPlus | ELLIPTIC CURVE CRYPTOGRAPHY | - |
dc.subject.keywordPlus | KEY EXCHANGE PROTOCOL | - |
dc.subject.keywordPlus | MUTUAL AUTHENTICATION | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | INDIFFERENTIABILITY | - |
dc.subject.keywordPlus | ROBUST | - |
dc.subject.keywordPlus | ECC | - |
dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
dc.relation.journalResearchArea | Environmental Sciences & Ecology | - |
dc.relation.journalWebOfScienceCategory | Green & Sustainable Science & Technology | - |
dc.relation.journalWebOfScienceCategory | Environmental Sciences | - |
dc.relation.journalWebOfScienceCategory | Environmental Studies | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | ssci | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.