An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things

Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart hea...

Full description

Bibliographic Details
Main Authors: Adel Ali Ahmed, Waleed Ali Ahmed
Format: Article
Language:English
Published: MDPI AG 2019-08-01
Series:Sensors
Subjects:
IoT
Online Access:https://www.mdpi.com/1424-8220/19/17/3663
id doaj-e37bdd517af24452a24f5f8c67dadcbe
record_format Article
spelling doaj-e37bdd517af24452a24f5f8c67dadcbe2020-11-25T02:30:41ZengMDPI AGSensors1424-82202019-08-011917366310.3390/s19173663s19173663An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of ThingsAdel Ali Ahmed0Waleed Ali Ahmed1Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Jeddah 25729, Saudi ArabiaFaculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Jeddah 25729, Saudi ArabiaInternet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart healthcare, smart transportation, etc. Due to the fact that the IoT devices have limited resources, the cybersecurity approaches that relied on complex and long processing cryptography are not a good fit for these constrained devices. Moreover, the current IoT systems experience critical security vulnerabilities that include identifying which devices were affected, what data or services were accessed or compromised, and which users were impacted. The cybersecurity challenge in IoT systems is to find a solution for handling the identity of the user, things/objects and devices in a secure manner. This paper proposes an effective multifactor authentication (CMA) solution based on robust combiners of the hash functions implemented in the IoT devices. The proposed CMA solution mitigates the authentication vulnerabilities of IoT and defends against several types of attacks. Also, it achieves multi-property robustness and preserves the collision-resistance, the pseudo-randomness, the message authentication code, and the one-wayness. It also ensures the integrity, authenticity and availability of sensed data for the legitimate IoT devices. The simulation results show that CMA outperforms the TOTP in term of the authentication failure rate. Moreover, the evaluation of CMA shows an acceptable QoS measurement in terms of computation time overhead, throughput, and packet loss ratio.https://www.mdpi.com/1424-8220/19/17/3663IoTauthenticationhash function
collection DOAJ
language English
format Article
sources DOAJ
author Adel Ali Ahmed
Waleed Ali Ahmed
spellingShingle Adel Ali Ahmed
Waleed Ali Ahmed
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
Sensors
IoT
authentication
hash function
author_facet Adel Ali Ahmed
Waleed Ali Ahmed
author_sort Adel Ali Ahmed
title An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_short An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_full An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_fullStr An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_full_unstemmed An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_sort effective multifactor authentication mechanism based on combiners of hash function over internet of things
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2019-08-01
description Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart healthcare, smart transportation, etc. Due to the fact that the IoT devices have limited resources, the cybersecurity approaches that relied on complex and long processing cryptography are not a good fit for these constrained devices. Moreover, the current IoT systems experience critical security vulnerabilities that include identifying which devices were affected, what data or services were accessed or compromised, and which users were impacted. The cybersecurity challenge in IoT systems is to find a solution for handling the identity of the user, things/objects and devices in a secure manner. This paper proposes an effective multifactor authentication (CMA) solution based on robust combiners of the hash functions implemented in the IoT devices. The proposed CMA solution mitigates the authentication vulnerabilities of IoT and defends against several types of attacks. Also, it achieves multi-property robustness and preserves the collision-resistance, the pseudo-randomness, the message authentication code, and the one-wayness. It also ensures the integrity, authenticity and availability of sensed data for the legitimate IoT devices. The simulation results show that CMA outperforms the TOTP in term of the authentication failure rate. Moreover, the evaluation of CMA shows an acceptable QoS measurement in terms of computation time overhead, throughput, and packet loss ratio.
topic IoT
authentication
hash function
url https://www.mdpi.com/1424-8220/19/17/3663
work_keys_str_mv AT adelaliahmed aneffectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings
AT waleedaliahmed aneffectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings
AT adelaliahmed effectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings
AT waleedaliahmed effectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings
_version_ 1724828577453572096