Lightweight multi-factor mutual authentication protocol for IoT devices

@article{Melki2019LightweightMM,
  title={Lightweight multi-factor mutual authentication protocol for IoT devices},
  author={Reem Melki and Hassan N. Noura and Ali Chehab},
  journal={International Journal of Information Security},
  year={2019},
  pages={1 - 16}
}
The Internet-of-Things (IoT), which refers to the interconnection of heterogeneous devices, has gained a lot of interest lately, and it witnessed a large growth in the number of IoT devices due to the importance of such systems in today’s communication networks. On the other hand, the authentication of entities (devices) is a major concern and a main security challenge in IoT systems since any weakness in the identification or authentication process will allow a compromised entity to establish… Expand
Secure authentication in IoT and cloud server: An ECC based practice
Abstract The word Internet-of-Things (IoT) is continuously growing interest in the research sector compared to other advanced paradigms with its well-known real-life applications. However, forExpand
Provable Privacy Preserving Authentication Solution for Internet of Things Environment
TLDR
An identity-based authentication and key agreement protocol for the IoT environment in order to offer the secure communication between various IoT entities is proposed and the performance and security analysis shows the supremacy of the devised protocol over the various related protocols. Expand
Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
TLDR
A distributed multi-party security computation framework for ensuring the security level of scalable information sharing and communications in heterogeneous IoT using synchronized security measures through recurrent verification on different communicating ends of the devices. Expand
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles
TLDR
The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad. Expand
Message authentication algorithm for OFDM communication systems
TLDR
This is the first work that proposes a keyed-hash function for complex OFDM symbols, based on physical layer conditions, and different security and performance tests are conducted to prove the robustness and efficiency of this technique, in comparison to currently employed message authentication schemes. Expand
Secret Sharing-based Authenticated Key Agreement Protocol
TLDR
A first AKA protocol based on the proof of knowledge concept, which allows a client to prove its identity to a server via secret information while the server can learn nothing about the secret, is introduced. Expand
Security Vulnerabilities in Existing Security Mechanisms for IoMT and Potential Solutions for Mitigating Cyber-Attacks
  • Mahbubur Rahman, H. Jahankhani
  • Computer Science
  • Information Security Technologies for Controlling Pandemics
  • 2021
TLDR
The Research critically evaluates the performance of the current Cryptographic authentication protocols against cyber-attacks and recommend the potential solutions for mitigating security vulnerabilities in IoMT devices. Expand
Physical layer security for NOMA: limitations, issues, and recommendations
TLDR
The PLS data confidentiality schemes for NOMA and their limitations, challenges, and countermeasures are discussed, and different methods to address the remaining security properties are proposed. Expand
Cyber-physical systems security: Limitations, issues and future trends
TLDR
The main aspects of CPS and the corresponding applications, technologies, and standards are surveyed and the existing security measures are presented and analyzed while identifying their main limitations. Expand
Towards a secure ITS: Overview, challenges and solutions
TLDR
An overview of ITS is presented stating the reasons behind the evolution from Vanet to IoV, and the main threats/attacks that threaten ITS are classified according to their security impact and according to the network layer they affect. Expand
...
1
2
...

References

SHOWING 1-10 OF 54 REFERENCES
Mutual Authentication in IoT Systems Using Physical Unclonable Functions
TLDR
A security and performance analysis of the protocols shows that they are not only robust against different types of attacks, but are also very efficient in terms of computation, memory, energy, and communication overhead. Expand
Physically secure mutual authentication for IoT
TLDR
This work presents mutual authentication protocols for IoT devices that are not only efficient but also secure against physical and cloning attacks, and uses physical unclonable functions (PUFs) to provide security to physically unprotected devices. Expand
A Light-Weight Mutual Authentication Protocol for IoT Systems
TLDR
An analysis of the proposed protocol shows that it is not only robust against different kind of attacks, but also very efficient in terms of memory, computations, energy, and communication overhead. Expand
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
TLDR
A new signature-based authenticated key establishment scheme for the IoT environment that provides more functionality features, and its computational and communication costs are also comparable with other existing approaches. Expand
Authenticating IoT Devices with Physically Unclonable Functions Models
TLDR
This paper exploits the knowledge of a PUF model in order to make available the whole CRPs set, and, by adopting an encryption scheme, hides it to avoid model based attacks which can be performed on CRPs sent in clear. Expand
Practical and Secure IoT Device Authentication Using Physical Unclonable Functions
  • John Ross Wallrabenstein
  • Computer Science
  • 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud)
  • 2016
TLDR
It is demonstrated that PUF-based protocols may be practically and securely deployed on low-cost resource-constrained IoT devices and achieves practical performance results, while also providing realistic security. Expand
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
TLDR
Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats. Expand
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
TLDR
This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues and analyzes the open challenges and strategies for future research work in the area. Expand
Secure Data Provenance for the Internet of Things
TLDR
A light-weight protocol for data provenance in the IoT that uses physical unclonable functions (PUFs) to provide physical security and uniquely identify an IoT device and wireless channel characteristics are used to uniquely identify a wireless link between an IoT devices and a server/user. Expand
PUF-based authentication
TLDR
The requirements for PUF-based authentication are described, and a PUF primitive and protocol designed for authentication in resource constrained devices are presented, derived from a 28 nm Xilinx FPGA. Expand
...
1
2
3
4
5
...