Secure and Efficient Authentication Scheme in IoT Environments

Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. Ho...

Full description

Bibliographic Details
Main Authors: Abhijeet Thakare, Young-Gab Kim
Format: Article
Language:English
Published: MDPI AG 2021-01-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/11/3/1260
id doaj-cac51562874b4607bf323aa8c380b02e
record_format Article
spelling doaj-cac51562874b4607bf323aa8c380b02e2021-01-30T00:07:03ZengMDPI AGApplied Sciences2076-34172021-01-01111260126010.3390/app11031260Secure and Efficient Authentication Scheme in IoT EnvironmentsAbhijeet Thakare0Young-Gab Kim1Department of Computer and Information Security, and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, KoreaDepartment of Computer and Information Security, and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, KoreaOptimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme’s security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme’s working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.https://www.mdpi.com/2076-3417/11/3/1260authentication schemeelliptic-curve cryptography (ECC)Internet of Thingscloudpairing-based cryptography (PBC)
collection DOAJ
language English
format Article
sources DOAJ
author Abhijeet Thakare
Young-Gab Kim
spellingShingle Abhijeet Thakare
Young-Gab Kim
Secure and Efficient Authentication Scheme in IoT Environments
Applied Sciences
authentication scheme
elliptic-curve cryptography (ECC)
Internet of Things
cloud
pairing-based cryptography (PBC)
author_facet Abhijeet Thakare
Young-Gab Kim
author_sort Abhijeet Thakare
title Secure and Efficient Authentication Scheme in IoT Environments
title_short Secure and Efficient Authentication Scheme in IoT Environments
title_full Secure and Efficient Authentication Scheme in IoT Environments
title_fullStr Secure and Efficient Authentication Scheme in IoT Environments
title_full_unstemmed Secure and Efficient Authentication Scheme in IoT Environments
title_sort secure and efficient authentication scheme in iot environments
publisher MDPI AG
series Applied Sciences
issn 2076-3417
publishDate 2021-01-01
description Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme’s security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme’s working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.
topic authentication scheme
elliptic-curve cryptography (ECC)
Internet of Things
cloud
pairing-based cryptography (PBC)
url https://www.mdpi.com/2076-3417/11/3/1260
work_keys_str_mv AT abhijeetthakare secureandefficientauthenticationschemeiniotenvironments
AT younggabkim secureandefficientauthenticationschemeiniotenvironments
_version_ 1724318327271063552