Journal Home > Volume 4 , issue 1

Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user’s data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.


menu
Abstract
Full text
Outline
About this article

New Enhanced Authentication Protocol for Internet of Things

Show Author's information Mourade Azrour( )Jamal MabroukiAzedine GuezzazYousef Farhaoui
IDMS Team, Department of Computer Science, Faculty of Sciences and Techniques, Moulay Ismail University, Errachidia 52000, Morocco.
Laboratory of Spectroscopy, Molecular Modeling, Materials, Nanomaterial, Water and Environment, CERNE2D, Faculty of Science, Mohammed V University in Rabat, Rabat 10000, Morocco.
Department of Computer Science and Mathematics, High School of Technology, Cadi Ayyad University, Marrakesh 40000, Morocco.

Abstract

Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user’s data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.

Keywords:

authetication, Internet of Things (IoT), sensor, security, authorization
Received: 08 June 2020 Accepted: 01 July 2020 Published: 12 January 2021 Issue date: March 2021
References(42)
[1]
J. Mabrouki, M. Azrour, Y. Farhaoui, and S. El Hajjaji, Intelligent system for monitoring and detecting water quality, in Big Data and Networks Technologies, Y. Farhaoui, ed. Springer International Publishing, 2020, pp.172-182.
[2]
S. I. Samsudin, S. I. M. Salim, K. Osman, S. F. Sulaiman, and M. I. A. Sabri, A smart monitoring of a water quality detector system, Indonesian Journal of Electrical Engineering and Computer Science, vol. 10, no. 3, pp. 951-958, 2018.
[3]
N. Zidan, M. Maree, and S. Samhan, An IoT-based monitoring and controlling system for water chlorination treatment, in Proceedings of the 2nd International Conference on Future Networks and Distributed Systems-ICFNDS’18, Amman, Jordan, 2018, pp. 1-6.
[4]
B. Patil and D. J. Digge, Water quality monitoring in IoT environment, International Organization of Scientific Research Journal of Engineering, vol. 2, pp. 20-25, 2018.
[5]
S. Pappu, P. Vudatha, A. V. Niharika, T. Karthick, and S. Sankaranarayanan, Intelligent IoT-based water quality monitoring system, International Journal of Engineering Research and Applications, vol. 12, no. 16, pp. 5447-5454, 2017.
[6]
N. A. A. Bakar, W. M. W. Ramli, and N. H. Hassan, The Internet of Things in healthcare: An overview, challenges and model plan for security risks management process, Indonesian Journal of Electrical Engineering and Computer Science, vol. 15, no. 1, pp. 414-420, 2019.
[7]
N. Chawla, AI, IoT and wearable technology for smart healthcare - A review, International Journal of Recent Research Aspects, vol. 7, no. 1, pp. 9-13, 2020.
[8]
M. S. Hossain, G. Muhammad, and A. Alamri, Smart healthcare monitoring: A voice pathology detection paradigm for smart cities, Multimedia Systems, vol. 25, no. 5, pp. 565-575, 2019.
[9]
A. Kumar, G. Chattree, and S. Periyasamy, Smart healthcare monitoring system, Wirel Pers Commun, vol. 101, no. 1, pp. 453-463, 2018.
[10]
D. W. Sukmaningsih, W. Suparta, A. Trisetyarso, B. S. Abbas, and C. H. Kang, Proposing smart disaster management in urban area, in Intelligent Information and Database Systems: Recent Developments, M. Huk, M. Maleszka, and E. Szczerbicki, eds. Springer International Publishing, 2020, pp. 3-16.
[11]
X. Wei, N.-B. Chang, K. Bai, and W. Gao, Satellite remote sensing of aerosol optical depth: Advances, challenges, and perspectives, Critical Reviews in Environmental Science and Technology, vol. 50, no. 16, pp. 1640-1725, 2020.
[12]
B. Bayat, N. Crasta, A. Crespi, A. M. Pascoal, and A. Ijspeert, Environmental monitoring using autonomous vehicles: A survey of recent searching techniques, Current Opinion in Biotechnology, .
[13]
A. Kulkarni and D. Mukhopadhyay, Internet of Things-based weather forecast monitoring system, Indonesian Journal of Electrical Engineering and Computer Science, vol. 9, no. 3, pp. 555-557, 2018.
[14]
H. Sayuti, R. A. Rashid, N. M. A. Latiff, M. R. A. Rahim, and N. E. Ghazali, Smart home and ambient assisted living based on the Internet of Things, International Journal of Electrical & Computer Engineering, vol. 7, no. 3, pp. 1480-1488, 2017.
[15]
W. M. Kang, S. Y. Moon, and J. H. Park, An enhanced security framework for home appliances in smart home, Human-centric Computing and Information Sciences, vol. 7, no. 1, pp. 1-12, 2017.
[16]
B. L. R. Stojkoska and K. V. Trivodaliev, A review of Internet of Things for smart home: Challenges and solutions, Journal of Cleaner Production, vol. 140, no. 3, pp. 1454-1464, 2017.
[17]
X. Hong, C. Yang, and C. Rong, Smart home security monitor system, International Symposium on Parallel & Distributed Computing, .
[18]
M. A. E.-L. Mowad, A. Fathy, and A. Hafez, Smart home automated control system using android application and microcontroller, International Journal of Scientific & Engineering Research, vol. 5, no. 5, pp. 935-939, 2014.
[19]
M. Soliman, T. Abiodun, T. Hamouda, J. Zhou, and C.-H. Lung, Smart home: Integrating Internet of Things with web services and cloud computing, .
[20]
Smarter with Gartner, The IoT effect: Opportunities and challenges, , 2018.
[21]
A. Osseiran, O. Elloumi, J. Song, and J. F. Monserrat, Internet of Things, IEEE Communications Magazine, vol. 1, no. 2, p. 84, 2017.
[22]
A. Sedrati and A. Mezrioui, A survey of security challenges in Internet of Things, Advances in Science Technology and Engineering Systems Journal, vol. 3, no. 1, pp. 274-280, 2018.
[23]
N. Ye, Y. Zhu, R. Wang, R. Malekian, and L. Qiao-min, An efficient authentication and access control scheme for perception layer of Internet of Things, Applied Mathematics & Information Sciences, vol. 8, no. 4, pp. 1617-1624, 2014.
[24]
M. Azrour, M. Ouanan, Y. Farhaoui, and A. Guezzaz, Security analysis of Ye et al. authentication protocol for Internet of Things, in Big Data and Smart Digital Environment, Y. Farhaoui and L. Moussaid, eds. Springer International Publishing, 2019, pp. 67-74.
[25]
M. A. Jan, P. Nanda, X. He, Z. Tan, and R. P. Liu, A robust authentication scheme for observing resources in the Internet of Things environment, .
[26]
S. Kalra and S. K. Sood, Secure authentication scheme for IoT and cloud servers, Pervasive & Mobile Computing, vol. 24, pp. 210-223, 2015.
[27]
V. S. Miller, Use of elliptic curves in cryptography, .
[28]
M. Wu, J. Chen, and R. Wang, An enhanced anonymous password-based authenticated key agreement scheme with formal proof, International Journal of Network Security, vol. 19, no. 5, pp. 785-793, 2017.
[29]
R. Fantacci, T. Pecorella, R. Viti, and C. Carlini, A network architecture solution for efficient IOT WSN backhauling: Challenges and opportunities, IEEE Wireless Communications, vol. 21, no. 4, pp. 113-119, 2014.
[30]
K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks, vol. 32, pp. 17-31, 2015.
[31]
M. Bayat, M. Beheshti-Atashgah, M. Barari, and M. R. Aref, Cryptanalysis and improvement of a user authentication scheme for Internet of Things using elliptic curve cryptography, IJ Network Security, vol. 21, no. 6, pp. 897-911, 2019.
[32]
X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo, A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments, Journal of Network and Computer Applications, vol. 103, pp. 194-204, 2018.
[33]
W.-L. Tai, Y.-F. Chang, and P.-L. Hou, Security analysis of a three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments, IJ Network Security, vol. 21, no. 6, pp. 1014-1020, 2019.
[34]
G. Sharma and S. Kalra, A secure remote user authentication scheme for smart cities e-governance applications, Journal of Reliable Intelligent Environments, vol. 3, no. 3, pp. 177-188, 2017.
[35]
P. K. Dhillon and S. Kalra, Multi-factor user authentication scheme for IoT-based healthcare services, Journal of Reliable Intelligent Environments, vol. 4, no. 3, pp. 141-160, 2018.
[36]
C. J. F. Cremers, The scyther tool: Verification, falsification, and analysis of security protocols, .
[37]
S. Kumari, M. Karuppiah, A. K. Das, X. Li, F. Wu, and N. Kumar, A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, The Journal of Supercomputing, vol. 74, no. 12, pp. 6428-6453, 2018.
[38]
W.-B. Hsieh and J.-S. Leu, A robust user authentication scheme using dynamic identity in wireless sensor networks, Wireless Personal Communications, vol. 77, no. 2, pp. 979-989, 2014.
[39]
C.-C. Chang and H.-D. Le, A provably secure, efficient, and flexible authentication scheme for Ad Hoc wireless sensor networks, IEEE Wireless Communications, vol. 15, no. 1, pp. 357-366, 2016.
[40]
H. L. Yeh, T. H. Chen, P. C. Liu, T. H. Kim, and H. W. Wei, A secured authentication protocol for wireless sensor networks using elliptic curves cryptography, Sensors, vol. 11, no. 5, pp. 4767-4779, 2011.
[41]
A. K. Das, A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks, Peer-to-Peer Networking and Applications, vol. 9, no. 1, pp. 223-244, 2016.
[42]
A. Ghani, K. Mansoor, S. Mehmood, S. A. Chaudhry, A. U. Rahman, and M. Najmus Saqib, Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key, International Journal of Communication Systems, vol. 32, no. 16, pp. 1-18, 2019.
Publication history
Copyright
Rights and permissions

Publication history

Received: 08 June 2020
Accepted: 01 July 2020
Published: 12 January 2021
Issue date: March 2021

Copyright

© The author(s) 2021

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Reprints and Permission requests may be sought directly from editorial office.

Return