Secure and Efficient Authentication Scheme in IoT Environments
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. Ho...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-01-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/11/3/1260 |
id |
doaj-cac51562874b4607bf323aa8c380b02e |
---|---|
record_format |
Article |
spelling |
doaj-cac51562874b4607bf323aa8c380b02e2021-01-30T00:07:03ZengMDPI AGApplied Sciences2076-34172021-01-01111260126010.3390/app11031260Secure and Efficient Authentication Scheme in IoT EnvironmentsAbhijeet Thakare0Young-Gab Kim1Department of Computer and Information Security, and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, KoreaDepartment of Computer and Information Security, and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, KoreaOptimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme’s security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme’s working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.https://www.mdpi.com/2076-3417/11/3/1260authentication schemeelliptic-curve cryptography (ECC)Internet of Thingscloudpairing-based cryptography (PBC) |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Abhijeet Thakare Young-Gab Kim |
spellingShingle |
Abhijeet Thakare Young-Gab Kim Secure and Efficient Authentication Scheme in IoT Environments Applied Sciences authentication scheme elliptic-curve cryptography (ECC) Internet of Things cloud pairing-based cryptography (PBC) |
author_facet |
Abhijeet Thakare Young-Gab Kim |
author_sort |
Abhijeet Thakare |
title |
Secure and Efficient Authentication Scheme in IoT Environments |
title_short |
Secure and Efficient Authentication Scheme in IoT Environments |
title_full |
Secure and Efficient Authentication Scheme in IoT Environments |
title_fullStr |
Secure and Efficient Authentication Scheme in IoT Environments |
title_full_unstemmed |
Secure and Efficient Authentication Scheme in IoT Environments |
title_sort |
secure and efficient authentication scheme in iot environments |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2021-01-01 |
description |
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme’s security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme’s working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps. |
topic |
authentication scheme elliptic-curve cryptography (ECC) Internet of Things cloud pairing-based cryptography (PBC) |
url |
https://www.mdpi.com/2076-3417/11/3/1260 |
work_keys_str_mv |
AT abhijeetthakare secureandefficientauthenticationschemeiniotenvironments AT younggabkim secureandefficientauthenticationschemeiniotenvironments |
_version_ |
1724318327271063552 |