Loading…
Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme
Summary Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is no...
Saved in:
Published in: | International journal of communication systems 2023-01, Vol.36 (1), p.n/a |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Summary
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen‐verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity.
In this article, we propose a lightweight authentication scheme for IoT that can satisfy various security requirements, including perfect forward secrecy and device anonymity, and is robust against various attacks, including replay, Denning‐Sacco, denial‐of‐service, stolen‐verifier, and impersonation attacks. We formally verify the security of the proposed protocol using BAN logic and Scyther tool. We also evaluate its computation and communication costs and prove that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes. |
---|---|
ISSN: | 1074-5351 1099-1131 |
DOI: | 10.1002/dac.4332 |