A multi‐attack resilient lightweight IoT authentication scheme
Majority of the devices in the Internet of Things (IoT) are deployed in an environment that is susceptible to cyber‐attacks. Due to the resource‐constraint nature of IoT, it is very hard to meet the security challenges that arise due to the deployment of IoT devices in the unsecure environment. In t...
Saved in:
Published in | Transactions on emerging telecommunications technologies Vol. 33; no. 3 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
01.03.2022
|
Online Access | Get full text |
Cover
Loading…
Summary: | Majority of the devices in the Internet of Things (IoT) are deployed in an environment that is susceptible to cyber‐attacks. Due to the resource‐constraint nature of IoT, it is very hard to meet the security challenges that arise due to the deployment of IoT devices in the unsecure environment. In this context, the authentication of IoT devices is one of the core challenges. Many protocols have been designed to address and overcome the security issues that stem from the authentication failure. However, many of these protocols are designed using the complex cryptographic techniques that may not be supported by IoT devices. In this paper, we propose a lightweight and secure mutual authentication scheme for resource constraint IoT devices. The proposed scheme is robust against cyber‐attacks, such as impersonation, modification, session key disclosure, and eavesdropping attacks. The security of the proposed scheme is formally tested using the Automated Validation of Internet Security Protocols and Applications tool and found the scheme to be secure in the Dolev‐Yao attack model. Moreover, the performance features such as communication overhead, computation time, and the turnaround time of the proposed scheme are evaluated and compared with the recent schemes of same category, where the proposed scheme shows a balance of performance without compromising the security features.
In this paper, we present a novel authentication scheme based on X‐OR operations and hash functions. The proposed scheme offers mutual authentication between the entities. The scheme generates session key for secure post‐authentication communication. The scheme is secure against well‐known cyber‐attacks, such as eavesdropping, impersonation, modification attack, replay attack, and man‐in‐the‐middle attack. The security of the proposed scheme is formally tested using the AVISPA tool in Dolev‐Yao threat model. |
---|---|
ISSN: | 2161-3915 2161-3915 |
DOI: | 10.1002/ett.3676 |