| Literature DB >> 31064133 |
Rafael Martínez-Peláez1, Homero Toral-Cruz2, Jorge R Parra-Michel3, Vicente García4, Luis J Mena5, Vanessa G Félix6, Alberto Ochoa-Brust7.
Abstract
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases.Entities:
Keywords: Internet of Things; authentication; cloud computing; mutual authentication; session key agreement
Year: 2019 PMID: 31064133 PMCID: PMC6539626 DOI: 10.3390/s19092098
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Authentication phase of Zhou et al.’s scheme.
Notations of the proposed scheme.
| Symbol | Description |
|---|---|
|
| User |
|
| Cloud server |
|
| Control server |
|
| Smart card of |
|
| Identity of |
|
| Pseudo-identity of |
|
| Password of |
|
| Secret keys of |
|
| Random nonce of |
|
| Timestamp of |
|
| Session key between |
|
| Symmetric encryption/decryption using |
|
| Collision free one-way hash function |
|
| Exclusive-OR operation |
|
| Concatenation operation |
|
| Secure communication channel |
|
| Open communication channel |
Figure 2User registration sub-phase.
Figure 3Server registration sub-phase.
Figure 4Login phase.
Figure 5User authentication, server authentication and evidence of connection attempt sub-phases.
Figure 6Key agreement and mutual authentication phases.
Security comparison.
| Security Property | Xue et al. | Amin et al. | Zhou et al. | Our Scheme |
|---|---|---|---|---|
| Provide evidence of connection attempt | fails | fails | fails | success |
| Provide mutual authentication | fails | fails | fails | success |
| Provide user anonymity | fails | success | ||
| Resist impersonation attack | fails | fails | fails | success |
| Resist off-line user identity/password attack | fails | success | ||
| Resist privileged-insider attack | fails | fails | success | |
| Resist replay attack | fails | success |
Performance comparison.
| Phase | Xue et al. | Amin et al. | Zhou et al. | Our Scheme | |
|---|---|---|---|---|---|
| Registration |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
| |
| Login |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
| |
| Authentication |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
| |
| Total |
|
|
|
|
Execution-time by participant.
| Xue et al. | Amin et al. | Zhou et al. | Our | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Op | Case 1 | Case 2 | Op | Case 1 | Case 2 | Op | Case 1 | Case 2 | Op | Case 1 | Case 2 | ||
| R |
| 3Th | 0.01551 | 0.0000984 | 3Th | 0.01551 | 0.0000984 | 3TH | 0.01551 | 0.0000984 | 2Th | 0.01034 | 0.0000656 |
|
| 0Th | 0 | 0 | 0Th | 0 | 0 | 0TH | 0 | 0 | 1Th | 0.00517 | 0.0000328 | |
|
| 4Th | 0.02068 | 0.0001312 | 4Th | 0.02068 | 0.0001312 | 4TH | 0.02068 | 0.0001312 | 12Th | 0.06204 | 0.0003936 | |
| L |
| 6Th | 0.03102 | 0.0001968 | 6Th | 0.03102 | 0.0001968 | 6Th | 0.03102 | 0.0001968 | 3Th | 0.01551 | 0.0000984 |
|
| 3Th | 0.01551 | 0.0000984 | 1Th | 0.00517 | 0.0000328 | 3Th | 0.01551 | 0.0000984 | 3Th | 0.01551 | 0.0000984 | |
|
| 0Th | 0 | 0 | 0Th | 0 | 0 | 0Th | 0 | 0 | 0Th | 0 | 0 | |
| A |
| 3Th | 0.01551 | 0.0000984 | 3Th | 0.01551 | 0.0000984 | 4Th | 0.02068 | 0.0001312 | 4Th + 3Ts | 0.08512 | 0.0644467 |
|
| 3Th | 0.01551 | 0.0000984 | 3Th | 0.01551 | 0.0000984 | 4Th | 0.02068 | 0.0001312 | 2Th + 3Ts | 0.07478 | 0.0643811 | |
|
| 14Th | 0.07238 | 0.0004592 | 10Th | 0.0517 | 0.000328 | 19Th | 0.09823 | 0.0006232 | 21Th + 2Ts | 0.15153 | 0.0435658 | |
| Total | 36Th | 0.18612 | 0.0011808 | 30Th | 0.1551 | 0.000984 | 43Th | 0.22231 | 0.0014104 | 48Th + 8Ts | 0.420000 | 0.173082 | |
*R = Registration phase, L = Login phase, A = Authentication phase, Op = Number of operations.
Figure 7Computational-cost comparison by participant.
Communication cost comparison.
| Xue et al. | Amin et al. | Zhou et al. | Our Scheme | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Length | Case 1 | Case 2 | Length | Case 1 | Case 2 | Length | Case 1 | Case 2 | Length | Case 1 | Case 2 | ||
| R |
| 3 | 384 | 768 | 2 | 256 | 512 | 2 | 256 | 512 | 2 | 256 | 512 |
|
| 2 | 256 | 512 | 2 | 256 | 512 | 2 | 256 | 512 | 2 | 256 | 512 | |
|
| 2 | 256 | 512 | 3 | 384 | 768 | 6 | 768 | 1536 | 4 | 512 | 1024 | |
| ST | 896 | 1792 | 896 | 1792 | 1280 | 2560 | 1024 | 2048 | |||||
| L |
| 6 | 768 | 1536 | 5 | 640 | 1280 | 5 | 640 | 1280 | 4 | 512 | 1024 |
|
| 11 | 1408 | 2816 | 9 | 1152 | 2304 | 10 | 1280 | 2560 | 9 | 1152 | 2304 | |
|
| 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
| ST | 2176 | 4352 | 1792 | 3584 | 1920 | 3840 | 1664 | 3328 | |||||
| A |
| 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 256 | 512 |
|
| 2 | 256 | 512 | 2 | 256 | 512 | 3 | 384 | 768 | 5 | 640 | 1280 | |
|
| 4 | 512 | 1024 | 4 | 512 | 1024 | 6 | 768 | 1536 | 6 | 768 | 1536 | |
| ST | 768 | 1536 | 768 | 1536 | 1152 | 2304 | 1664 | 3328 | |||||
| T | 30 | 3840 | 7680 | 27 | 3456 | 6912 | 34 | 4352 | 8704 | 34 | 4352 | 8704 | |
*R = Registration phase, L = Login phase, A = Authentication phase, ST = Subtotal, T = Total.