New enhanced authentication protocol for Internet of Things

Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user's data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.

[1]  Ya-Fen Chang,et al.  Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments , 2019, Int. J. Netw. Secur..

[2]  Anass Sedrati,et al.  A Survey of Security Challenges in Internet of Things , 2018 .

[3]  Nipun Bansal,et al.  Peer to Peer Networking and Applications , 2013 .

[4]  Mohammad Reza Aref,et al.  Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography , 2019, Int. J. Netw. Secur..

[5]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[6]  Jong Hyuk Park,et al.  An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.

[7]  Sheetal Kalra,et al.  Multi-factor user authentication scheme for IoT-based healthcare services , 2018, Journal of Reliable Intelligent Environments.

[8]  Gaurav Tiwari Hardware/Software Based a Smart Sensor Interface Device for Water Quality Monitoring in IoT Environment , 2015 .

[9]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[10]  Wei Gao,et al.  Satellite remote sensing of aerosol optical depth: advances, challenges, and perspectives , 2019, Critical Reviews in Environmental Science and Technology.

[11]  Jenq-Shiou Leu,et al.  A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[12]  Romano Fantacci,et al.  A network architecture solution for efficient IOT WSN backhauling: challenges and opportunities , 2014, IEEE Wireless Communications.

[13]  Agung Trisetyarso,et al.  Proposing Smart Disaster Management in Urban Area , 2019, ACIIDS.

[14]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.

[15]  Chunming Rong,et al.  Smart Home Security Monitor System , 2016, 2016 15th International Symposium on Parallel and Distributed Computing (ISPDC).

[16]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[17]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[18]  Ahmed Fathy,et al.  Smart Home Automated Control System Using Android Application and Microcontroller , 2014 .

[19]  A. Ijspeert,et al.  Environmental monitoring using autonomous vehicles: a survey of recent searching techniques. , 2017, Current Opinion in Biotechnology.

[20]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[21]  Yuehong Yin,et al.  The internet of things in healthcare: An overview , 2016, J. Ind. Inf. Integr..

[22]  Mourade Azrour,et al.  Intelligent System for Monitoring and Detecting Water Quality , 2019 .

[23]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[24]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[25]  Xiong Li,et al.  A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..

[26]  Debajyoti Mukhopadhyay,et al.  Internet of Things Based Weather Forecast Monitoring System , 2018 .

[27]  S. I. Samsudin,et al.  A Smart Monitoring of a Water Quality Detector System , 2018, Indonesian Journal of Electrical Engineering and Computer Science.

[28]  Maryline Laurent-Maknavicius,et al.  Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.

[29]  Geeta Sharma,et al.  A secure remote user authentication scheme for smart cities e-governance applications , 2017, Journal of Reliable Intelligent Environments.

[30]  Min Wu,et al.  An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof , 2017, Int. J. Netw. Secur..

[31]  Mohammed Maree,et al.  An IoT based monitoring and controlling system for water chlorination treatment , 2018, ICFNDS.

[32]  Ashok Kumar Das,et al.  A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..

[33]  Arif Ur Rahman,et al.  Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key , 2019, Int. J. Commun. Syst..

[34]  M. Shamim Hossain,et al.  Smart healthcare monitoring: a voice pathology detection paradigm for smart cities , 2019, Multimedia Systems.

[35]  Rozeha A. Rashid,et al.  Smart Home and Ambient Assisted Living Based on the Internet of Things , 2017 .

[36]  Kire Trivodaliev,et al.  A review of Internet of Things for smart home: Challenges and solutions , 2017 .

[37]  Abhishek Kumar,et al.  Smart Healthcare Monitoring System , 2018, Wirel. Pers. Commun..

[38]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[39]  Ms. Nidhi Chawla IOT and Wearable Technology for Smart Healthcare – A Review , 2020 .

[40]  N. H. Hassan,et al.  The internet of things in healthcare: an overview, challenges and model plan for security risks management process , 2019, Indonesian Journal of Electrical Engineering and Computer Science.

[41]  Azidine Guezzaz,et al.  Security Analysis of Ye et al. Authentication Protocol for Internet of Things , 2018 .