| Literature DB >> 35632264 |
Tsu-Yang Wu1, Qian Meng1, Saru Kumari2, Peng Zhang1.
Abstract
With the rapid development of technology based on the Internet of Things (IoT), numerous IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role in solving the resource constraints of IoT devices and in promoting resource sharing, whereby users can access IoT services provided in various environments. However, this complex and open wireless network environment poses security and privacy challenges. Therefore, designing a secure authentication protocol is crucial to protecting user privacy in IoT services. In this paper, a lightweight authentication protocol was designed for IoT-enabled cloud computing environments. A real or random model, and the automatic verification tool ProVerif were used to conduct a formal security analysis. Its security was further proved through an informal analysis. Finally, through security and performance comparisons, our protocol was confirmed to be relatively secure and to display a good performance.Entities:
Keywords: IoT; authentication protocol; cloud computing; formal security analysis
Year: 2022 PMID: 35632264 PMCID: PMC9147194 DOI: 10.3390/s22103858
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Architecture of IoT-enabled cloud computing.
A summary of authentication protocols.
| Protocols | Advantages | Shortcomings |
|---|---|---|
| Turkanovic et al. [ | (1) Provides user anonymity | (1) Cannot resist insider |
| Wazid et al. [ | (1) Can resist user | - |
| Wu et al. [ | (1) Can resist temporary value | (1) Cannot resist sensor |
| Tsai and Lo [ | (1) Can resist temporary value | (1) Cannot resist server |
| Irshad et al. [ | (1) Can resist user | (1) Lacks user |
| Amin et al. [ | (1) Can resist temporary value | (1) Cannot prevent |
| Martinez et al. [ | (1) Can resist user | (1) Cannot prevent |
| Zhou et al. [ | (1) Provides user anonymity | (1) Cannot prevent replay |
| Kang et al. [ | (1) Can resist | (1) Cannot resist offline |
Notations.
| Notations | Meanings |
|---|---|
|
| The |
|
| The |
|
| The |
|
| |
|
| |
|
| |
|
| |
|
| Smart card |
|
| Control server |
|
| |
|
| The secret key of |
|
| |
|
| |
|
| Hash function |
|
| Fuzzy extraction function |
|
| Two parameters generated by the fuzzy extractor [ |
|
| Timestamps |
Figure 2Information exchange process.
Figure 3User registration phase.
Figure 4Cloud server registration phase.
Figure 5Login and authentication phase.
Figure 6Definitions.
Figure 7Process.
Figure 8Results.
Comparisons of security.
| Security Properties | [ | [ | [ | [ | Ours |
|---|---|---|---|---|---|
| S1 | ✓ | ✓ | × | ✓ | ✓ |
| S2 | × | ✓ | ✓ | ✓ | ✓ |
| S3 | ✓ | × | ✓ | ✓ | ✓ |
| S4 | × | × | × | ✓ | ✓ |
| S5 | ✓ | × | × | ✓ | ✓ |
| S6 | ✓ | ✓ | × | ✓ | ✓ |
| S7 | ✓ | ✓ | ✓ | × | ✓ |
| S8 | × | ✓ | ✓ | ✓ | ✓ |
The computational costs of complex operations.
| Operations | Symbolic | D1 (ms) | D2 (ms) | D3 (ms) | Server (Cloud, Contorl) |
|---|---|---|---|---|---|
| Symmetric Decryption |
| 0.04125 | 0.2 | 0.2 | 0.1347 |
| Symmetric Encryption |
| 0.2 | 0.0392 | 0.0591 | 4.7 |
| Hash function |
| 0.00103 | 0.00251 | 0.00102 | 0.0052 |
| Fuzzy function |
| 0.05665 | 0.143 | 0.00561 | - |
Comparative results of user computational costs.
| Protocols | User | D1 (ms) | D2 (ms) | D3 (ms) |
|---|---|---|---|---|
| Amin et al. [ |
| 0.0093 | 0.0226 | 0.0092 |
| Martinez et al. [ |
| 0.0526 | 0.2275 | 0.2112 |
| Zhou et al. [ |
| 0.0103 | 0.0251 | 0.0102 |
| Kang et al. [ |
| 0.0082 | 0.0201 | 0.0082 |
| Ours |
| 0.0697 | 0.1681 | 0.0158 |
Figure 9Comparative results of user computational costs [13,17,18,19].
Comparative results of server computational costs.
| Protocols | Cloud Server | Control Server | Total (ms) |
|---|---|---|---|
| Amin et al. [ |
|
| 0.0728 |
| Martinez et al. [ |
|
| 14.5774 |
| Zhou et al. [ |
|
| 0.1404 |
| Kang et al. [ |
|
| 0.0728 |
| Ours |
|
| 0.0936 |
Comparisons in terms of communication and storage costs.
| Protocols | Number of Rounds | Communication Costs (Bits) | Storage Costs (Bits) | Security |
|---|---|---|---|---|
| Amin et al. [ | 5 | 3680 | 1152 | Insecure |
| Martinez et al. [ | 6 | 6016 | 1664 | Insecure |
| Zhou et al. [ | 4 | 4448 | 2112 | Insecure |
| Kang et al. [ | 2 | 4000 | 1278 | Cannot resist offline password guessing attack |
| Ours | 5 | 4544 | 1320 | Provable secruity |
Figure 10Comparative results of communication costs [13,17,18,19].
Figure 11Comparative results of storage costs [13,17,18,19].
Voltage and current of devices.
| Devices | U (V) | I (mA) |
|---|---|---|
| D1 | 4.08 | 531 |
| D2 | 610 | 3.58 |
| D3 | 508 | 4.08 |
Energy costs.
| Protocols | D1 (uJ) | D2 (uJ) | D3 (uJ) |
|---|---|---|---|
| Amin et al. [ | 20.148 | 49.354 | 19.068 |
| Martinez et al. [ | 113.957 | 496.814 | 437.74 |
| Zhou et al. [ | 22.315 | 54.813 | 21.14 |
| Kang et al. [ | 17.751 | 43.894 | 16.996 |
| Ours | 151.004 | 367.097 | 32.748 |
Figure 12Comparative results of energy costs [13,17,18,19].