Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Toward Designing a Secure Authentication Protocol for IoT Environments

Full metadata record
DC Field Value Language
dc.contributor.authorHosseinzadeh, Mehdi-
dc.contributor.authorMalik, Mazhar Hussain-
dc.contributor.authorSafkhani, Masoumeh-
dc.contributor.authorBagheri, Nasour-
dc.contributor.authorLe, Quynh Hoang-
dc.contributor.authorTightiz, Lilia-
dc.contributor.authorMosavi, Amir H.-
dc.date.accessioned2023-05-16T08:41:13Z-
dc.date.available2023-05-16T08:41:13Z-
dc.date.issued2023-04-
dc.identifier.issn2071-1050-
dc.identifier.issn2071-1050-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/87761-
dc.description.abstractAuthentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the designers presented the first security analysis of the proposed protocol, that protocol has not been independently analyzed by third-party researchers, to the best of our knowledge. On the other hand, it is generally agreed that no cryptosystem should be used in a practical application unless its security has been verified through security analysis by third parties extensively, which is addressed in this paper. Although it is an efficient protocol by design compared to other related schemes, our security analysis identifies the non-ideal properties of this protocol. More specifically, we show that this protocol does not provide perfect forward secrecy. In addition, we show that it is vulnerable to an insider attacker, and an active insider adversary can successfully recover the shared keys between the protocol's entities. In addition, such an adversary can impersonate the remote server to the user and vice versa. Next, the adversary can trace the target user using the extracted information. Finally, we redesign the protocol such that the enhanced protocol can withstand all the aforementioned attacks. The overhead of the proposed protocol compared to its predecessor is only 15.5% in terms of computational cost.-
dc.language영어-
dc.language.isoENG-
dc.publisherMDPI-
dc.titleToward Designing a Secure Authentication Protocol for IoT Environments-
dc.typeArticle-
dc.identifier.wosid000970283500001-
dc.identifier.doi10.3390/su15075934-
dc.identifier.bibliographicCitationSUSTAINABILITY, v.15, no.7-
dc.description.isOpenAccessY-
dc.identifier.scopusid2-s2.0-85152782559-
dc.citation.titleSUSTAINABILITY-
dc.citation.volume15-
dc.citation.number7-
dc.type.docTypeArticle-
dc.publisher.location스위스-
dc.subject.keywordAuthorinternet of things-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorauthentication-
dc.subject.keywordAuthorkey agreement-
dc.subject.keywordAuthormulti-factor-
dc.subject.keywordAuthorsmart-card-
dc.subject.keywordAuthorhash function-
dc.subject.keywordAuthorinsider attacker-
dc.subject.keywordAuthorkey compromised impersonation-
dc.subject.keywordAuthorkey recovery-
dc.subject.keywordPlusPRIVACY-PRESERVING AUTHENTICATION-
dc.subject.keywordPlusELLIPTIC CURVE CRYPTOGRAPHY-
dc.subject.keywordPlusKEY EXCHANGE PROTOCOL-
dc.subject.keywordPlusMUTUAL AUTHENTICATION-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordPlusINDIFFERENTIABILITY-
dc.subject.keywordPlusROBUST-
dc.subject.keywordPlusECC-
dc.relation.journalResearchAreaScience & Technology - Other Topics-
dc.relation.journalResearchAreaEnvironmental Sciences & Ecology-
dc.relation.journalWebOfScienceCategoryGreen & Sustainable Science & Technology-
dc.relation.journalWebOfScienceCategoryEnvironmental Sciences-
dc.relation.journalWebOfScienceCategoryEnvironmental Studies-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassssci-
dc.description.journalRegisteredClassscopus-
Files in This Item
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher TIGHTIZ, LILIA photo

TIGHTIZ, LILIA
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE