| Literature DB >> 31121895 |
JoonYoung Lee1, SungJin Yu2, KiSung Park3, YoHan Park4, YoungHo Park5.
Abstract
Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is an open channel, which is insecure to attacks from adversaries such as replay attacks, impersonation attacks, and invasions of privacy. To provide secure IoT services to users, mutual authentication protocols have attracted much attention as consequential security issues, and numerous protocols have been studied. In 2017, Bae et al. presented a smartcard-based two-factor authentication protocol for multi-gateway IoT environments. However, we point out that Bae et al.'s protocol is vulnerable to user impersonation attacks, gateway spoofing attacks, and session key disclosure, and cannot provide a mutual authentication. In addition, we propose a three-factor mutual authentication protocol for multi-gateway IoT environments to resolve these security weaknesses. Then, we use Burrows-Abadi-Needham (BAN) logic to prove that the proposed protocol achieves secure mutual authentication, and we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to analyze a formal security verification. In conclusion, our proposed protocol is secure and applicable in multi-gateway IoT environments.Entities:
Keywords: AVISPA; cryptanalysis, BAN logic; internet of things; multi-gateway; mutual authentication
Year: 2019 PMID: 31121895 PMCID: PMC6566155 DOI: 10.3390/s19102358
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1System model of our protocol in multi-gateway IoT environments.
Notations.
| Notations | Meanings |
|---|---|
|
| i-th user |
|
| j-th server |
|
| Control server |
|
| Identity of |
|
| Identity of |
|
| Password of |
|
| Master secret key chosen by |
|
| Timestamp |
|
| Random number generated by |
|
| Random number generated by |
|
| Random number generated by |
|
| Common session key shared among |
|
| Collision-resistant one-way hash function |
Figure 2Registration phase of Bae et al.’s protocol.
The verifier table.
| User-Verifier | Anonymity Value | Status-Bit |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 3Login and authentication phase of Bae et al.’s protocol.
Figure 4Password change phase of Bae et al.’s protocol.
Figure 5Registration phase of our proposed protocol.
Figure 6Login and authentication phase of our proposed protocol.
Figure 7Password change phase of our proposed protocol.
Notations of Burrows–Abadi–Needham (BAN) logic.
| Notations | Meaning |
|---|---|
|
| |
|
| The statement |
|
| |
|
| |
|
| |
|
| Formula |
|
| Formula |
|
| |
|
| Session key used in the current authentication session |
Figure 8Specification of session and environments.
Figure 9Specification of user.
Figure 10Specification of gateway.
Figure 11Specification of control server.
Figure 12The result of Automated Validation of Internet Security Protocols and Applications (AVISPA) simulation using OFMC and CL-AtSe.
Computation cost of the login and authentication phase.
| Protocols | User | Gateway | Control Server | Total Cost |
|---|---|---|---|---|
| Turkanovic et al. [ | 7 | 5 | 7 | 19 |
| Wu et al. [ | 2 | - | 1 | 3 |
| Amin and Biswas Case-1 [ | 7 | 5 | 8 | 20 |
| Amin and Biswas Case-2 [ | 8 | 5 | 7 | 20 |
| Bae et al. [ | 5 | 6 | 10 | 21 |
| Ours | 1 | 5 | 9 | 1 |
XOR operation is negligible compared to other operations.
Communication cost.
| Protocols | Communication Cost |
|---|---|
| Turkanovic et al. [ | 4000 bits |
| Wu et al. [ | 2368 bits |
| Amin and Biswas Case-1 [ | 2080 bits |
| Amin and Biswas Case-2 [ | 3520 bits |
| Bae et al. [ | 2720 bits |
| Ours | 2400 bits |
Security properties.
| Security Property | Turkanovic et al. [ | Wu et al. [ | Amin and Biswas [ | Bae et al. [ | Ours |
|---|---|---|---|---|---|
| User impersonation attack | x | x | o | x | o |
| Server spoofing attack | o | x | x | x | o |
| Smartcard stolen attack | x | x | x | x | o |
| Trace attack | x | x | x | x | o |
| Off-line password guessing attack | x | o | x | o | o |
| Replay attack | o | o | o | o | o |
| Man-in-the-middle attack | o | o | o | o | o |
| Desynchronization attack | - | - | x | - | o |
| Anonymity | x | x | x | o | o |
| Mutual authentication | x | x | o | x | o |
x: does not prevent the property; o: prevents the property; -: does not concern the property.