1. Introduction
The Internet of Things (IoT) has become an essential technology in business and industry that is being applied to various environments [
1,
2,
3,
4,
5,
6,
7,
8] including telecare systems, smart grids, intelligent transportation systems, and global roaming systems to make human lives more prosperous. For example, in IoT-based telecare environments (see
Figure 1), medical devices and sensors check the patient’s pulse, blood pressure, and body temperature in real time, and transmit the information to a remote server. Thereafter, users such as doctors and researchers authenticate the server using mobile devices (i.e., smart phones) and access the information for diagnosis or research. IoT-based telecare systems can provide convenience to patients and contribute to the progress of healthcare. In addition, the IoT can be applied to other environments for increasing business productivity and industrial efficiency.
However, despite these advantages, several challenges must be addressed. Communications in IoT environments are performed on wireless channels, which are prone to attacks by adversaries. They can obtain transmitted messages and can attempt various attacks including replay, man-in-the-middle, and impersonation attacks [
9,
10,
11] and also attempt to trace a user to obtain sensitive information. Additionally, to ensure real-time communication of mobile devices with limited computing power [
12], the efficiency of the authentication protocol should be considered. Therefore, a secure and efficient authentication protocol is necessary for sustainable communications in IoT environments. However, recently proposed authentication schemes in IoT environments have several security vulnerabilities, and require high amounts of computation using elliptic curve cryptosystem (ECC) [
13] scalar multiplication and bilinear paring operations [
14]. These shortcomings can cause problems with the sustainability of the network.
Rajaram et al. [
15] proposed a user authentication scheme using bilinear pairing in 2019. They claimed that their scheme is secure against possible attacks and provides various security features. However, we analyze that their scheme has several security vulnerabilities to be applied in wireless networks. Their scheme cannot guarantee user anonymity and requires a high amount of computational cost because it uses bilinear pairing. Therefore, we propose an improved authentication protocol that can resolve these issues.
1.1. Motivation
In IoT environments, each message is transmitted through public channels. The messages can contain personal sensitive information, and if the information is leaked to an adversary, it can cause serious privacy threats. Additionally, IoT devices have limited computing resources, a high amount of computation cost can cause delays. Therefore, a secure and efficient authentication protocol is essential for sustainable IoT environments. In 2019, Rajaram et al. proposed a pairing-based user authentication scheme. However, Rajaram et al. scheme does not have resistance to off-line guessing, impersonation, privileged insider, and known session-specific temporary information attacks. In addition to Rajaram et al. scheme, we note the limitations and weaknesses of existing researches (see
Section 2). Several schemes used elliptic curve multiplication and bilinear pairing which require a high amount of computation, making it unsuitable for IoT environments. Additionally, most schemes do not have resistance to various attacks including impersonation, off-line guessing, and privileged insider attacks, and cannot guarantee security features such as mutual authentication, user anonymity, and user untraceability. Because of these weaknesses, existing schemes are not sustainable in IoT environments, and it motivated us to design a new authentication protocol that overcomes the drawbacks of existing researches and ensures both security and efficiency.
1.2. Main Contributions
The main contributions of this paper are as follows.
We analyze that Rajaram et al. scheme [
15] is vulnerable to offline password guessing, impersonation, privileged insider, and known session-specific temporary information attacks, and does not provide user anonymity and untraceability.
We propose a secure, lightweight, and anonymous authentication protocol, which uses only hash and exclusive-or operations, making it suitable for IoT environments.
We provide informal analyses of the proposed protocol and perform a security analysis under the real-or-random (RoR) model to prove the session key security.
We prove correctness of the proposed protocol using the BAN logic, and show that the proposed protocol is secure against replay and MiTM attacks using automated validation of internet security protocols and application (AVISPA) simulation tool.
We provide comparison results between the proposed protocol with existing protocols proposed in IoT environments. It shows that our protocol has lower computation and communication costs than the existing protocols, and that the proposed protocol is more suitable to real IoT environments.
2. Related Works
Over the past few years, many authentication protocols have been proposed for IoT environments. In 2018, Chen et al. [
16] proposed a lightweight and anonymous authentication scheme for IoT environments. They used ECC for authentication and analyzed the scheme using the BAN logic. They also simulated computation and communication costs using C++. Dhillon and Kalra [
17] proposed a three-factor user authentication scheme for IoT-based healthcare systems. They handled authentication between medical professionals and a cloud server. Thakare and Kim [
18] indicated security and efficiency of the existing protocols and proposed an ECC-based authentication scheme for IoT environments. They formally analyzed the scheme using both AVISPA and ProVerif tools to prove security and correctness. However, these schemes [
16,
17,
18] suffer from high computation cost, as they used an elliptic curve cryptosystem.
Some studies proposed lightweight authentication protocols using only hash and exclusive-or operations. In 2014, Kumari et al. [
19] proposed a two-factor remote user authentication scheme for distributed systems. They claimed that their scheme has various security characteristics including resistance to smart card stolen attack and user impersonation attack. However, Kaul and Awasthi [
20] indicated that the Kumari et al. scheme is vulnerable to smart card loss attacks. They proposed an enhanced authentication protocol and formally analyzed it using the AVISPA simulation tool. Kang et al. [
21] showed that Kaul and Awasthi’s scheme cannot guarantee user anonymity, and is not secure against off-line password guessing and desynchronization attacks. They proposed a biometric-based key agreement scheme. However, they does not consider known session-specific temporary information attacks. Rana et al. [
22] also asserted that Kaul and Awasthi’s scheme cannot resist user impersonation attacks using a stolen smart card, and proposed a lightweight authentication scheme, which is suitable for IoT infrastructures. However, their scheme does not consider known session-specific temporary information attacks and cannot ensure user untraceability.
In 2019, Rajaram et al. [
15] proposed a bilinear pairing based user authentication scheme. They claimed that their scheme is secure against off-line guessing, privileged insider, and impersonation attacks and can ensure mutual authentication. However, we observe that Rajaram et al. scheme cannot defend against mentioned attacks, and is vulnerable to known session-specific temporary information attack and suffers from lack of user anonymity. Their scheme also requires high computation cost as it uses bilinear pairing operation. In this paper, we propose a secure, lightweight, and anonymous user authentication scheme that resolves the above mentioned issues and is suitable for IoT environments.
3. Review of Rajaram et al.’s Scheme
Rajaram et al.’s scheme consists of initialization, user registration, user login, user authentication, and password update phase.
Table 1 represents the notations of Rajaram et al.’s scheme and the detailed description of each phase is as follows.
3.1. Initialization Phase
generates a large prime number q, chooses an additive cyclic group and a multiplicative cyclic group with order q, and selects a cryptographic hash function . Thereafter, chooses a generator and calculates , and selects a secret key and the public key of is . keeps securely and publishes .
3.2. User Registration Phase
registers to
using
and
. Firstly,
chooses a
and computes
. Thereafter,
sends
to
. After
receives the message,
computes
and
. After that,
stores
in
. Thereafter,
issues
to
, and
stores
y in
. Subsequently,
is stored in
. The registration phase is performed via a secure channel.
Figure 2 shows the registration phase of Rajaram et al. scheme.
3.3. User Login Phase
A registered
can be offered services form
by inserting
to the card reader. After
inputs
and
to
,
computes
,
, and
. Thereafter,
checks whether
. If they are equal,
chooses
and computes
,
, and
.
is a current timestamp. Thereafter,
sends
to
through a wireless channel.
Figure 3 shows the login phase of Rajaram et al. scheme.
3.4. User Authentication Phase
After receiving the message from
,
verifies the validity of
and checks whether
, where
is a timestamp when
received the message and
is a tolerance. Thereafter,
computes
,
,
and
. Subsequently,
checks whether
. If they are equal,
chooses
and computes
,
,
,
, and session key
. Then,
sends
to
. After
receives the message,
checks whether
and computes
,
, and
. If
,
computes session key
.
Figure 4 shows the authentication phase of Rajaram et al. scheme.
3.5. Password Change Phase
The password change phase of the Rajaram et al. scheme can be conducted through a new registration (see
Section 3.2) or during the authentication phase (see
Section 3.3 and
Section 3.4).
4. Cryptanalysis of the Rajaram et al. Scheme
Rajaram et al. asserted that their scheme has resistance to impersonation and privileged insider attacks. However, we observed that their scheme cannot prevent impersonation and privileged insider attacks. We also analyzed the Rajaram et al. scheme with the CK model and found that it is vulnerable to known session-specific temporary information attacks.
4.1. Adversary Model
To analyze the security of the proposed protocol, we adopt the Dolev–Yao (DY) adversary model [
23]. The DY model is an widely-accepted adversary model, which is applied to various authentication protocols [
24,
25,
26,
27]. An adversary
A has the following assumptions in the DY model.
A has full control over transmitted messages on wireless channels. A can eavesdrop, delete, inject, and modify messages.
A can steal a smart card of a legitimate user and can extract the stored value using power analysis [
28,
29].
A can use the values obtained from the previous assumptions to attempt active attacks such as off-line guessing, impersonation, and session key disclosure.
We also apply the Canetti and Krawczyk (CK) adversary model [
30] to further analyze the proposed protocol. The CK model has a stronger assumption compared to the DY model, and is also widely used in the analysis of an authentication protocol [
31,
32,
33]. In the CK model,
A can compromise session states and hijack random values generated in each session.
4.2. Off-Line Password Guessing Attack
By the assumptions of
Section 4.1, an adversary
A can obtain
stored in
and the transmitted message
through an open channel. Thereafter,
A can attempt off-line password guessing attack as follows.
A guesses password from a password dictionary, and then computes .
Thereafter, A computes and , and checks whether .
If it satisfies, A succeeds in guessing the correct password. If not, A performs the process again from the beginning.
4.3. Impersonation Attack
Using the guessed password as described in
Section 4.2,
A can impersonate as
.
A generates a timestamp and .
A computes , , , and .
A sends to . After receives the message, regards the message as sent by , and sends a response message.
A succeeds in impersonating as . Therefore, Rajaram et al.’s scheme cannot defend against the impersonation attack.
4.4. Privileged Insider Attack
If A is an privileged insider, A can obtain the registration request message of and can attempt to discover the session key using the information. To calculate , A can use and , which are obtained from open channels. A computes , , and . Thereafter, A computes and . Finally, A can calculate , and therefore, Rajaram et al.’s scheme cannot resist a privileged insider attack.
4.5. Known Session-Specific Temporary Information Attack
Under the CK model, A can comprise a session and obtain session random numbers and . Then, A can disclose the session key using the random numbers. A can obtain the messages and , which are transmitted during the authentication phase. Thereafter, A can compute , , , , . A can calculate and , and obtain . Therefore, Rajaram et al. scheme is vulnerable to known session-specific temporary information attacks.
4.6. User Anonymity and Untraceability
In Rajaram et al.’s scheme, user identity is transmitted on a wireless channel without being masked and encrypted. Therefore, A can obtain from transmitted messages to trace . Rajaram et al.’s scheme cannot support privacy-preservation and can raise serious security issues in several IoT environments, such as healthcare systems and smart home.
5. Proposed Scheme
The proposed scheme includes an initialization, user registration, user login, user authentication, and password update phase.
Table 2 describes the notations of the proposed scheme.
5.1. Initialization
chooses a large prime q, generates a secret key , and selects a cryptographic hash function . publishes and keeps s securely.
5.2. User Registration Phase
Before the authentication,
registers to
.
chooses
and
, and generates
.
computes
, and then sends
to
.
checks whether
is already registered after receiving the message. If not,
chooses
, and computes
and
. Thereafter,
stores
in secure memory.
generates a fuzzy extractor
and stores
in smart card
.
transmits
to
. Subsequently,
computes
,
,
, and
l.
replaces
to
in
. The proposed user registration phase is shown in
Figure 5.
5.3. User Login Phase
inputs
and
in
. Thereafter,
computes
,
, and
, and checks
l. If they are equal,
generates
and current timestamp
, and computes
and
. Thereafter,
sends
to
. The proposed login phase is shown in
Figure 6.
5.4. User Authentication Phase
After
receives the authentication request message,
checks whether
. Subsequently,
retrieves
using
, computes
and
, and checks
. If it is valid,
generates
and current timestamp
. Thereafter,
generates
,
,
,
,
, and
, where
and
are updated temporary identity and secret identity of
, respectively.
sends
to
. After reception of the message,
checks whether
, computes
,
,
and
, and checks whether
. If they are equal, the session key is established. Thereafter,
computes
,
, and
l. Subsequently,
updates
to
in
. The proposed mutual authentication phase is shown in
Figure 7.
5.5. Password Change Phase
After the authentication phase, generates a new password and a random number , computes , and sends a password change request message to including . Thereafter, updates to and the password update is completed.
6. Security Analysis
We analyze the security of the proposed protocol using informal analysis and formal analysis such as the BAN logic, RoR model, and AVISPA.
6.1. Informal Analysis
We informally describe that the proposed protocol is secure against the following attacks.
6.1.1. Replay and MITM Attacks
In the proposed protocol, each message transmitted during the authentication contains a timestamp and random number. Timestamps and , and random numbers and are included in message hash values and . An adversary cannot forge these message hash values, and therefore, the proposed protocol is secure against replay and MITM attacks.
6.1.2. Off-Line Guessing Attack
By assumption of the adversary model, an adversary A can attempt off-line guessing attack using transmitted messages and , and the extracted values from . Using a password dictionary, A can guess and calculate ), , and , and can check whether l. However, A cannot know that the guessed is legitimate because is masked using fuzzy verifier l. The probability that is a legitimate password is , which is negligible.
6.1.3. Impersonation Attack
A can attempt to impersonate as
and send the authentication request message to
.
A can obtain
from the transmitted message. However, referring to
Section 6.1.2,
A cannot generate a valid authentication request message because
A cannot guess the correct
in polynomial time and
A cannot calculate the valid
and
. Therefore, the proposed protocol can defend against the impersonation attack.
6.1.4. Session Key Disclosure Attack
A can directly attempt to compute using transmitted messages and extracted values of . A has to obtain , , and to calculate . However, A cannot acquire any of these values because they are masked using s, , and , which are secret values. The proposed protocol has resistance to session key disclosure attacks.
6.1.5. Perfect Forward Secrecy
If the long-term secret key s is compromised to A, then A can compute , where is obtained from a public channel. However, cannot calculate and without obtaining , which is stored in the secure memory of . Therefore, A cannot calculate and the proposed protocol supports perfect forward secrecy.
6.1.6. Privileged Insider Attack
As we described in
Section 4.4,
A can obtain the message transmitted during the registration phase, and can use it to calculate
.
A can calculate
using
, and can obtain messages transmitted on public channels. In this scenario,
A still cannot calculate the session key without knowing
, which is masked with secret key
s.
A also cannot calculate
and
. Therefore, the proposed protocol is secure against privileged insider attacks.
6.1.7. Stolen Verifier Attack
When the verification table stored in can be compromised, then A can obtain the list of . A can retrieve the corresponding from . However, A cannot calculate or obtain and , which are necessary to compute . The proposed protocol has resistance to stolen verifier attacks.
6.1.8. Known Session-Specific Temporary Information Attack
A can hijack the session and obtain random numbers and , which are generated during the authentication. A cannot calculate without knowing ’s secret key s. Additionally, A cannot gain any information for a future authentication request message of . Even if session random numbers are leaked to A, the proposed protocol is secure.
6.1.9. User Anonymity and Untraceability
In the proposed protocol, is not transmitted in public channels. Instead, uses temporal identity for authentication. is updated to in every session, and is veiled until request a new authentication to . Therefore, user anonymity is ensured in the proposed protocol. Additionally, A cannot find the connection between and to trace .
6.2. Formal Analysis Using the Ban Logic
The BAN logic [
34] is a widely-accepted [
35,
36,
37] analysis method to verify the correctness of an authentication protocol. The BAN logic is simple but robust validation logic to prove the mutual authentication of an authentication protocol. In the BAN logic analysis, we set the idealized form of the transmitted messages and assumptions of the BAN logic proof. Thereafter, we perform the proof based on the BAN logic rules. We have presented notations of the BAN logic in
Table 3, then describe the assumptions and idealized forms, and conduct the BAN logic proof in turn.
6.2.1. BAN Logic Rules
The basic rules of the BAN logic are as followings:
Message meaning rule (MMR):
Nonce verification rule (NVR):
6.2.2. Goals
The goals are to show that and believe that they agreed on the same session key.
- Goal 1:
- Goal 2:
- Goal 3:
- Goal 4:
6.2.3. Idealized Forms
The idealized forms of the messages exchanged during the authentication can be described as follows.
:
:
6.2.4. Assumptions
The basic assumptions for the BAN logic proof are as follows:
- :
- :
- :
- :
- :
- :
6.2.5. Ban Logic Proof
We perform the BAN logic proof of the proposed protocol as below:
- Step 1:
- Step 2:
Applying
and
to the MMR, we can obtain
.
- Step 3:
Applying
and
to the FR, we can obtain
.
- Step 4:
Applying
and
to the NVR, we can obtain
.
- Step 5:
We can obtain
applying
to the BR.
- Step 6:
- Step 7:
Applying
and
to the MMR, we can obtain
.
- Step 8:
Applying
and
to the FR, we can obtain
.
- Step 9:
Applying
and
to the NVR, we can obtain
.
- Step 10:
We can obtain
applying
to the BR.
- Step 11:
From
and
,
and
can compute session key
.
- Step 12:
The JR can be applied to
and
using
and
, respectively.
Finally, the user and server are mutually authenticated each other.
6.3. Formal Analysis Using the Ror Model
The RoR model [
38] is a formal analysis method of an authentication protocol [
39,
40,
41,
42]. The RoR model is used to verify the semantic security of session key
of an authentication protocol probabilistically. Under the RoR model, an adversary
A can attempt passive and active attacks represented by queries to find
. Before conducting the RoR model based analysis, we explain notations and queries to be used. We denote
as a participant with the
instance. Thereafter,
and
are participants
and
with
and
instances, respectively. Additionally, the queries executed by
A are presented in
Table 4.
A can get the output value of the hash function for the input by performing a
query. When
is the probability of the advantage for
A to break the session key, we prove the following equation:
where
represents the number of hash queries performed by
A,
represents the range space of the cryptographic hash function,
represents the number of
queries performed by
A, and
represents the size of the password dictionary.
Proof. A plays four games under the RoR model. We denote is a advantage of A to compromise after playing .
:
A selects the bit
c at the start of the game. In the first game,
A has no information about
and no queries to perform. By the definition of semantic security, we can induce the following equation.
:
A attempts an eavesdropping attack in this game. First,
A uses the
query. Thereafter,
A performs a
query to receive the return value. Finally,
A guesses whether the value is
or a random number. For
A to win the game,
A should be able to calculate
, which is computed by
,
, and
. These values cannot be obtained using eavesdropping attacks. There is no advantage for
A to be gained by the
query. Therefore, the advantage of
A at the end of
is equal to that at the end of
.
: In this game,
A uses the
and
queries to compromise
. From the transmitted messages,
A obtains
and
. However, the only way for
A to win the game is to find a hash collision because there is no information about
from these values. The advantage function at the end of
is as follows by the birthday paradox.
: In the final game,
A performs a stolen smart card attack, which is represented as the
query, then
A can extract
from
. To win the game,
A should succeed in finding the identity
and password
simultaneously to login to
. Because
A cannot obtain any information about
and
,
A should guess the values from identity dictionary
and password dictionary
. Thereafter, the following equation can be induced.
After all the games are over,
A should guess the correct bit
c from the
query. It follows that
From Equations (
2) and (
3), we can obtain the following equation:
We can apply the triangular inequality to Equation (
7).
We can obtain the following equation using Equations (
7) and (
8).
which is the same as Equation (
1). Finally, we prove the semantic security of the proposed protocol using the RoR model. □
6.4. Formal Analysis Using Avispa Simulation
The AVISPA tool [
43] can verify that the authentication protocol is secure against replay and MITM attacks by simulating the implementation of the authentication protocol as code. AVISPA is used in many authentication protocols as a formal verification tool [
44,
45,
46]. It is implemented using the “High-Level Protocol specification Language” (HLPSL) and uses four back-ends: “On-the-fly Model-Checker (OFMC)”, “SAT-based Model-Checker (SATMC)”, “Constraint Logic Based Attack Searcher (CL-AtSe)”, and “Tree Automata based on Automatic Approximations for the Analysis of Security Protocols (TA4SP)”. The HLPSL2IF translator converts the intermediate format (IF) of the code implemented using HLPSL into the output format (OF). The OF shows the simulation results which include “SUMMARY”, “DETAILS”, “PROTOCOL”, “GOAL”, “BACKEND”, and “STATISTICS”. The SUMMARY shows whether the protocol is safe, the BACKEND gives the name of the back-ends, and STATISTICS shows the time of the trace of the attack. The left side of
Figure 8 represents the role of user implemented in AVISPA tool. The remote server is implemented similar to the user. Furthermore, the right side of
Figure 8 shows the session, environments, and goals of the proposed protocol.
Generally, the AVISPA simulation is executed using the OFMC and CL-AtSe models, which support the exclusive-or operation. If the summaries under the two back-end models are safe, we can say that the protocol is secure against replay and MITM attacks. The simulation results are shown in
Figure 9. The simulation summaries of the proposed protocol are safe under the OFMC and CL-AtSe back-ends. This means that the back-ends cannot search for an attack. Therefore, we verify that the proposed protocol has resistance to the replay and MITM attacks.
7. Performance Analysis
In this section, we compare the computation and communication cost of the proposed protocols with related protocols [
15,
16,
17,
18,
19,
20,
21,
22].
7.1. Computation Cost
Referring to the classification in [
12], user’s mobile device is class 15, and the remote server is class 19. Considering the different computing powers of user’s mobile device and the remote server, we conducted the experiment in both Raspberry PI (class 14) and desktop environments (class 17). The desktop is quad-core i7-4790 CPU with a 16GB RAM and the operation system is the Linux Ubuntu 20.04, and Raspberry PI 3B is a quad-core system with 1GB RAM. We used the MIRACL Cryptography library to implement the operations used for the authentication protocols [
47]. The executed operations and execution time are as presented in
Table 5. As shown in
Table 5, the operations on Raspberry Pi take 2–3 times longer than the operations on desktop.
According to the results shown in
Table 5, we calculate the total computation cost of the proposed protocol and other related protocols [
15,
16,
17,
18,
19,
20,
21,
22] as shown in
Table 6. Some existing lightweight schemes are more efficient than the proposed scheme. However, the existing lightweight schemes is vulnerable to a variety of attacks. The proposed scheme has considerably higher efficiency than the public key-based protocols and also can provide better security.
7.2. Communication Cost
We calculate the total bits transmitted during the authentication to compare the communication costs. We assumed that a timestamp is 32 bits, identity and password are 128 bits, SHA-256 hash output is 256 bits, a random number is 256 bits, an elliptic curve point is 320 bits, and an element of a pairing-based group is 1024 bits. The total communication cost of the existing and proposed schemes are as presented in
Table 7.
Similar to the results in
Table 6, the total communication cost of the proposed scheme is slightly higher than those of the existing lightweight protocols [
19,
20,
21,
22]. However, the proposed scheme generates lower communication cost than those in [
15,
16,
17,
18]. Furthermore, as described in
Section 7.3, our protocol is more secure than existing schemes.
7.3. Security Features
We analyzed security characteristics of the proposed protocol with related protcols. This includes: A1: “ Resistance to replay attack”, A2: “Resistance to privileged insider attack”, A3: “Resistance to known session specific temporary information attack”, A4: “Resistance to off-line guessing attack”, A5: “Resistance to impersonation attack”, A6: “Resistance to session key disclosure attack”, A7: “Support of perfect forward secrecy”, A8: “Support of user anonymity”, A9: “Support of user untraceability”, A10: “Formal proof using the BAN logic” A11: “Formal proof using the RoR model”, and A12: “Formal proof using the AVISPA simulation”.
Table 8 shows that the proposed protocol has better security than other protocols.
8. Conclusions
In this paper, we designed a secure, lightweight, and anonymous authentication protocol suitable for IoT environments. The proposed protocol resolved security flaws of the Rajaram et al. scheme. It uses only hash and exclusive-or operations during the authentication. Therefore, it is considerably more efficient than Rajaram et al. scheme as well as other existing authentication schemes proposed for IoT environments. Additionally, the proposed protocol can defeat various attacks and ensure more security features than the existing protocols. We analyzed the proposed protocol using BAN logic analysis to prove the correctness, the RoR model to formally verify the session key security, and the AVISPA simulation tool to show the resistance against replay and man-in-the-middle (MITM) attacks. The proposed protocol is sustainable because it has a high security level and low computation cost, and it can contribute to increase energy efficiency and reduce economic costs. Therefore, the proposed protocol can be applied to for various IoT environments. In the future work, we plan to implement the proposed protocol in practice.
Author Contributions
Conceptualization, S.S.; methodology, S.S. and Y.P. (Yohan Park); software, S.S.; validation, Y.P. (Yohan Park) and Y.P. (Youngho Park); formal analysis, S.S. and Y.P. (Yohan Park); writing—original draft preparation, S.S.; writing—review and editing, Y.P. (Yohan Park) and Y.P. (Youngho Park); supervision, Y.P. (Youngho Park). All authors have read and agreed to the published version of the manuscript.
Funding
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(2021R1I1A3059551).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Chen, C.M.; Xiang, B.; Liu, Y.; Wang, K.H. A secure authentication protocol for internet of vehicles. IEEE Access 2019, 7, 12047–12057. [Google Scholar] [CrossRef]
- Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.P.C.; Kim, K.R.C.; Park, Y. On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system. IEEE Trans. Veh. Technol. 2021, 70, 1736–1751. [Google Scholar] [CrossRef]
- Rathee, G.; Ahmad, F.; Sandhu, R.; Kerrache, C.A.; Azad, M.A. On the design and implementation of a secure blockchain-based hybrid framework for industrial Internet-of-Things. Inf. Process. Manag. 2021, 58, 102526. [Google Scholar] [CrossRef]
- Nikooghadam, M.; Amintoosi, H.; Islam, S.H.; Moghadam, M.F. A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. J. Syst. Archit. 2021, 115, 101955. [Google Scholar] [CrossRef]
- Barka, E.; Dahmane, S.; Kerrache, C.A.; Khayat, M.; Sallabi, F. STHM: A secured and trusted healthcare monitoring architecture using SDN and blockchain. Electronics 2021, 10, 1787. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Hussain, R.; Succi, G.; Rodrigues, J.J. Authentication in cloud-driven IoT based big data environment: Survey and outlook. J. Syst. Archit. 2019, 97, 185–196. [Google Scholar] [CrossRef]
- Mahmood, K.; Akram, W.; Shafiq, A.; Altaf, I.; Lodhi, M.A.; Islam, S.H. An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments. Comput. Elect. Eng. 2020, 88, 106888. [Google Scholar] [CrossRef]
- Belghazi, Z.; Benamar, N.; Addaim, A.; Kerrache, C.A. Secure WiFi-direct using key exchange for Iot device-to-device communications in a smart environment. Future Internet 2019, 11, 251. [Google Scholar] [CrossRef] [Green Version]
- Banerjee, S.; Das, A.K.; Chattopadhyay, S.; Jamal, S.S.; Rodrigues, J.J.; Park, Y. Lightweight failover authentication mechanism for IoT-based fog computing environment. Electronics 2021, 10, 1417. [Google Scholar] [CrossRef]
- Oh, J.; Yu, S.; Lee, J.; Son, S.; Kim, M.; Park, Y. A secure and lightweight authentication protocol for IoT-based smart homes. Sensors 2021, 21, 1488. [Google Scholar] [CrossRef]
- Das, A.K.; Wazid, M.; Yannam, A.R.; Rodrigues, J.J.; Park, Y. Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 2019, 7, 55382–55397. [Google Scholar] [CrossRef]
- Terminology for Constrained-Node Networks. Available online: https://datatracker.ietf.org/doc/draft-bormann-lwig-7228bis/06/ (accessed on 17 August 2020).
- Miller, V.S. Use of elliptic curves in cryptography. In Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Linz, Austria, 9–11 April 1985; pp. 417–426. [Google Scholar]
- Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Advances in Cryptology; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229. [Google Scholar]
- Rajaram, S.; Maitra, T.; Vollala, S.; Ramasubramanian, N.; Amin, R. eUASBP: Enhanced user authentication scheme based on bilinear pairing. J. Ambient Intell. Humaniz. Comput. 2019, 11, 2827–2840. [Google Scholar] [CrossRef]
- Chen, Y.; Martínez, J.F.; Castillejo, P.; López, L. A lightweight anonymous client–server authentication scheme for the internet of things scenario: LAuth. Sensors 2018, 18, 3695. [Google Scholar] [CrossRef] [Green Version]
- Thakare, A.; Kim, Y.G. Secure and efficient authentication scheme in IoT environments. Appl. Sci. 2021, 11, 1260. [Google Scholar] [CrossRef]
- Dhillon, P.K.; Kalra, S. Multi-factor user authentication scheme for IoT-based healthcare services. J. Reliab. Intell. Environ. 2018, 4, 141–160. [Google Scholar] [CrossRef]
- Kumari, S.; Khan, M.K.; Li, X. An improved remote user authentication scheme with key agreement. Comput. Elect. Eng. 2014, 40, 1997–2012. [Google Scholar] [CrossRef]
- Kaul, S.D.; Awasthi, A.K. Security enhancement of an improved remote user authentication scheme with key agreement. Wirel. Pers. Commun. 2016, 89, 621–637. [Google Scholar] [CrossRef]
- Kang, D.; Jung, J.; Kim, H.; Lee, Y.; Won, D. Efficient and secure biometric-based user authenticated key agreement scheme with anonymity. Secur. Commun. Netw. 2018, 2018, 9046064. [Google Scholar] [CrossRef] [Green Version]
- Rana, M.; Shafiq, A.; Altaf, I.; Alazab, M.; Mahmood, K.; Chaudhry, S.A.; Zikria, Y.B. A secure and lightweight authentication scheme for next generation IoT infrastructure. Comput. Commun. 2021, 165, 85–96. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Wazid, M.; Bagga, P.; Das, A.K.; Shetty, S.; Rodrigues, J.J.; Park, Y. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment. IEEE Internet Things J. 2019, 6, 8804–8817. [Google Scholar] [CrossRef]
- Ali, Z.; Ghani, A.; Khan, I.; Chaudhry, S.A.; Islam, S.H.; Giri, D. A robust authentication and access control protocol for securing wireless healthcare sensor networks. J. Inform. Secur. Appl. 2020, 52, 102502. [Google Scholar] [CrossRef]
- Xiong, H.; Wu, Y.; Jin, C.; Kumari, S. Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J. 2020, 7, 11713–11724. [Google Scholar] [CrossRef]
- Lee, J.; Kim, G.; Das, A.K.; Park, Y. Secure and efficient honey list-based authentication protocol for vehicular ad hoc networks. IEEE Trans. Netw. Sci. Eng. 2021. [Google Scholar] [CrossRef]
- Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Advances in Cryptology; Springer: Berlin/Heidelberg, Germany, 1999; pp. 388–397. [Google Scholar]
- Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552. [Google Scholar] [CrossRef] [Green Version]
- Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology; Springer: Berlin/Heidelberg, Germany, 2001; pp. 453–474. [Google Scholar]
- Fotouhi, M.; Bayat, M.; Das, A.K.; Far, H.A.N.; Pournaghi, S.M.; Doostari, M.A. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Netw. 2020, 177, 107333. [Google Scholar] [CrossRef]
- Khan, A.A.; Kumar, V.; Ahmad, M.; Rana, S. LAKAF: Lightweight authentication and key agreement framework for smart grid network. J. Syst. Archit. 2021, 116, 102053. [Google Scholar] [CrossRef]
- Nakkar, M.; AlTawy, R.; Youssef, A. Lightweight broadcast authentication protocol for edge-based applications. IEEE Internet Things J. 2020, 7, 11766–11777. [Google Scholar] [CrossRef]
- Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
- Wu, T.Y.; Lee, Y.Q.; Chen, C.M.; Tian, Y.; Al-Nabhan, N.A. An enhanced pairing-based authentication scheme for smart grid communications. J. Ambient. Intell. Humaniz. Comput. 2021. [Google Scholar] [CrossRef]
- Son, S.; Lee, J.; Kim, M.; Yu, S.; Das, A.K.; Park, Y. Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain. IEEE Access 2020, 8, 192177–192191. [Google Scholar] [CrossRef]
- Lee, J.; Yu, S.; Kim, M.; Park, Y.; Das, A.K. On the design of secure and efficient three-factor authentication protocol using honey list for wireless sensor networks. IEEE Access 2020, 8, 107046–107062. [Google Scholar] [CrossRef]
- Abdalla, M.; Fouque, P.A.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC’05), Les Diablerets, Switzerland, 23–26 January 2005; pp. 65–84. [Google Scholar]
- Kwon, D.; Yu, S.; Lee, J.; Son, S.; Park, Y. WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors 2021, 21, 936. [Google Scholar] [CrossRef] [PubMed]
- Das, A.K.; Bera, B.; Wazid, M.; Jamal, S.S.; Park, Y. iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment. IEEE Access 2021, 9, 87024. [Google Scholar] [CrossRef]
- Lee, J.; Yu, S.; Kim, M.; Park, Y.; Lee, S.; Chung, B. Secure key agreement and authentication protocol for message confirmation in vehicular cloud computing. Appl. Sci. 2020, 10, 6268. [Google Scholar] [CrossRef]
- Ayub, M.F.; Shamshad, S.; Mahmood, K.; Islam, S.H.; Parizi, R.M.; Choo, K.K.R. A provably secure two-factor authentication scheme for USB storage devices. IEEE Trans. Consum. Elect. 2020, 66, 396–405. [Google Scholar] [CrossRef]
- AVISPA. Automated Validation of Internet Security Protocols and Applications. Available online: http://www.avispa-project.org/ (accessed on 17 August 2021).
- Yu, S.; Lee, J.; Park, K.; Das, A.K.; Park, Y. IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access 2020, 8, 167875–167886. [Google Scholar] [CrossRef]
- Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Park, Y. An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 2020, 20, 1215. [Google Scholar] [CrossRef] [Green Version]
- Kim, M.; Lee, J.; Park, K.; Park, Y.; Park, K.; Park, Y. Design of secure decentralized car-sharing system using blockchain. IEEE Access 2021, 9, 54796–54810. [Google Scholar] [CrossRef]
- MIRACL Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library. Available online: https://github.com/miracl/MIRACL (accessed on 17 August 2021).
| Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).