| Literature DB >> 25123464 |
Bruce Ndibanje1, Hoon-Jae Lee2, Sang-Gon Lee3.
Abstract
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.Entities:
Mesh:
Year: 2014 PMID: 25123464 PMCID: PMC4179010 DOI: 10.3390/s140814786
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Gartner 2013 Hype Cycle of emerging technologies.
Figure 2.IoT architecture example.
Notations and description.
| Finite field | |
| Elliptic curve defined on | |
| Point on | |
| Group of elliptic curve points on | |
| One-way hash function | |
| Identity of user | |
| Identity of the “thing” | |
| Registration authority | |
| Home registration authority | |
| Internet of Thing | |
| Elliptic curve cryptosystem | |
| Role based access control |
Figure 3.Unilateral authentication message.
Updated table.
| Password of | |
| Generated Nonce by HRA to User | |
| Unique Identity number of the device | |
| Generated Nonce for the gateway | |
| User ID of the gateway | |
| Message | |
| Message | |
| Bitwise XOR operation | |
| ‖ | Concatenation operation |
Figure 4.Registration phase flow.
Figure 5.Authentication phase: login and verification steps flow.
Figure 6.Authentication phase: login and verification steps flow.
Figure 7.Authentication phase: login and verification steps flow.