Design of a Multifactor Unidentified Remote End User Authentication Mechanism for IoT Network
Abstract
The rapid proliferation of Internet of Things (IoT) devices, coupled with the rollout of advanced 5G networks, has generated significant concerns regarding security breaches. These concerns stem from the expanded attack surfaces that come with improved connectivity, making IoT systems more vulnerable to malicious threats. A crucial strategy to counter these security challenges is the implementation of robust user authentication methods. Despite numerous proposals for multi-factor authentication mechanisms, many of these systems exhibit weaknesses, particularly in their susceptibility to user impersonation attacks and the risks posed by stolen mobile devices. Furthermore, several schemes fail to incorporate essential features such as session key agreements or backup solutions for instances of lost or stolen devices and compromised private keys. To address urgent security challenges in IoT environments, we developed a three-factor user authentication system tailored for low-cost IoT devices. This system tackles critical vulnerabilities while maintaining low computing and communication costs, enhancing security without compromising usability and efficiency.
Full Text:
PDFReferences
Park O , Hwang H, Lee C, Shin J . Trends of 5g massive lot, electronics and telecommunications. Trends 2016;31(1):68–77.
Series M . Imt vision–framework and overall objectives of the future development of it for 2020 and beyond. Recommendation ITU 2015. 2083–0
Ahmad I , Shahabuddin S , Kumar T , Okwuibe J , Gurtov A , Ylianttila M Security for 5g and beyond. IEEE Communications Surveys & Tutorials 2019.
Mishra D . Efficient and secure two-factor dynamic id-based password authentication scheme with provable security. Cryptologia 2018;42(2):146–75.
Srinivas J , Mukhopadhyay S , Mishra D . A self-verifiable password-based authentication scheme for multi-server architecture using a smart card. Wireless Personal Communications 2017;96(4):6273–97.
Li L-H , Lin L-C , Hwang MS . A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans Neural Networks 2001;12(6):1498–504.
. Dhillon PK , Kalra S . Secure multi-factor remote user authentication scheme for Internet of things environments. Int J Commun Syst 2017;30(16):e3323.
Xu J , Zhu W-T, Feng DG. An improved smart card-based password authentication scheme with provable security. Computer Standards & Interfaces 2009;31(4):723–8.
Banerjee S , Mukhopadhyay D . Symmetric key-based authenticated querying in wireless sensor networks. In: Proceedings of the first international conference on integrated Internet ad hoc and sensor networks. ACM; 2006. p. 22.
Du W , Wang R , Ning P . An efficient scheme for authenticating public keys in sensor networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. ACM; 2005. p. 58–67.
Chatterjee S , Das AK. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks 2015;8(9):1752–71.
Chung Y , Choi S , Won D . Anonymous authentication scheme for an intercom- communication in the Internet of things environments. Int J Distrib Sens Netw 2015;11(11):305785.
Park Y , Park Y . Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 2016;16(12): 2123 .
Wong KH, Zheng Y , Cao J, Wang S . A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing-Vol 1 (SUTC’06)-Volume 01, IEEE Computer Society; 2006. p. 244–51.
Khan MK , Alghathbar K . Cryptanalysis and security improvements of ’two-factor user authentication in wireless sensor networks. Sensors 2010;10(3):2450–9 .
He D , Gao Y , Chan S , Chen C , Bu J . An enhanced two-factor user authentication scheme in wireless sensor networks. Ad hoc & sensor wireless networks 2010;10(4):361–71 .
Vaidya B , Makrakis D , Mouftah HT . Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications. IEEE; 2010. p. 600–6 .
Yeh H-L , Chen T-H , Liu P-C , Kim T-H , Wei HW . A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011;11(5):4767–79.
Xue K , Ma C , Hong P , Ding R . A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 2013;36(1):316–23 .
Li C-T , Weng C-Y , Lee CC . An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 2013;13(8):9589–603 .
C.-Y. Chen, P. H. Chou, “DuraCap: a supercapacitor-based, power-bo- outstripping, maximum power point tracking energy-harvesting system”, in ACM/IEEE International Symposium on Low-Power Electronics Design, TX, USA, 2010, pp. 313-318. [CrossRef ] [22] X. Jiang, J. Polastre, D. Culler, “Perpetual environmentally powered sensor networks,” in The 4th International Symposium on Informa- tion Processing in Sensor Networks, ID, USA, 2005, pp. 463-468.
M. Habibzadeh, M. Hassanalieragh, A. Ishikawa, T. Soyata, G. Shar- ma, “Hybrid solar-wind energy harvesting for embedded appli- cations: supercapacitor-based system architectures and design tradeoffs”, IEEE Circuits and Systems Magazine, vol. 17, no. 4, pp. 29-63, Nov, 2017. [CrossRef]
M. Hassanalieragh, T. Soyata, A. Nadeau, G. Sharma, “UR-SolarCap: an open source intelligent auto-wakeup solar energy harvesting system for supercapacitor based energy buffering”, IEEE Access, vol. 4, pp. 542-557, Jan, 2016. [CrossRef]
Turkanovi ´c M , Brumen B , Hölbl M . A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 2014;20:96–112.
Farash MS , Turkanovi ´c M , Kumari S , Hölbl M . An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw 2016;36:152–76.
Brunelli, C. Moser, L. Thiele, L. Benini, “Design of a solar-harvesting circuit for batteryless embedded systems”, IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 56, no. 11, pp. 2519- 2528, Feb, 2009. [CrossRef]
C. Park, P. H. Chou, “AmbiMax: autonomous energy harvesting platform for multi-supply wireless sensor nodes” in The 3rd Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, VA, USA, 2006, pp. 168-177. [CrossRef]
F. I. Simjee, P. H. Chou, “Efficient charging of supercapacitors for extended lifetime of wireless sensor nodes”, IEEE Transactions on Power Electronics, vol. 23, no. 3, pp. 1526-1536, May 2008. [CrossRef]
P. Bhatnagar, R. K. Nema, “Maximum power point tracking cont- rol techniques: state-of-the-art in photovoltaic applications”, Re- newable and Sustainable Energy Reviews, vol. 23, pp. 224-241, July 2013. [CrossRef]
H. Islam, S. Mekhilef, N. B. M. Shah, T. K. Soon, M. Seyedmahmousi- an, B. Horan, A. Stojcevski, “Performance evaluation of maximum power point tracking approaches and photovoltaic systems”, Energies, vol. 11, no. 2, pp. 365-389, Feb, 2018. [CrossRef]
T. Esram, P. L. Chapman, “Comparison of photovoltaic array maximum power point tracking techniques”, IEEE Transactions on Energy Conversion, vol. 22, no. 2, pp. 439-449, June 2007. [CrossRef]
S. Kim, K.-S. No, P. H. Chou, “Design and performance analysis of supercapacitor charging circuits for wireless sensor nodes”, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 1, no. 3, pp. 391-402, Sep, 2011. [CrossRef]
D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, L. Benini, “Modeling and optimization of a solar energy harvester system for self-powe- red wireless sensor networks”, IEEE Transactions on Industrial Electronics, vol. 55, no. 7, pp. 2759-2766, July, 2008.[CrossRef]
C. Moser, L. Thiele, D. Brunelli, L. Benini, “Adaptive power management for environmentally powered systems”, IEEE Transactions on Computers, vol. 59, no. 4, pp. 478-491, Apr, 2010. [CrossRef]
C. Bergonzini, D. Brunelli, L. Benini, “Comparison of energy intake prediction algorithms for systems powered by photovoltaic har- vesters”, Microelectronics Journal, vol. 40, no. 11, pp. 766-777, Nov, 2010. [CrossRef]
A. Kansal, D. Potter, M. B. Srivastava, “Performance aware tasking for environmentally powered sensor networks”, in Joint Interna- tional Conference on Measurement and Modeling of Computer Systems, NY, USA, 2004, pp. 223-234. [CrossRef]
J. Hsu, S. Zahedi, A. Kansal, M. B. Srivastava, V. Raghunathan, “Adaptive duty cycling for energy harvesting systems”, in The International Symposium on Low Power Electronics and Design, Tegernsee, Germany, 2006, pp.180-185. [CrossRef]
A. Kansal, M. B. Srivastava, “Energy harvesting aware power management”, Wireless Sensor Networks: A Systems Perspective, ch. 9, pp. 1-10, Artech House, MA, USA, 2005.
A. Kansal, J. Hsu, S. Zahedi, M. B. Srivastava, “Power management in energy harvesting sensor networks”, ACM Transactions on Em- bedded Computing Systems, vol. 6, no. 4, pp. 1-35, Sep, 2007. [CrossRef]
Kumari S , Khan MK , Li X . A more secure digital rights management authentication scheme based on smart card. Multimed Tools Appl 2016;75(2):1135–58 .
Das AK , Kumari S , Odelu V , Li X , Wu F , Huang X . Provably secure user authen- tication and key agreement scheme for wireless sensor networks. Security and Communication Networks 2016;9(16):3670–87 .
Chang C-C , Le HD . A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 2015;15(1):357–66 .
Yang Z , Lai J , Sun Y , Zhou J . A novel authenticated key agreement protocol with dynamic credential for wsns. ACM Transactions on Sensor Networks (TOSN) 2019;15(2):22 ..
Banerjee S , Chunka C , Sen S , Goswami RS . An enhanced and secure biomet- ric based user authentication scheme in wireless sensor networks using smart cards. Wireless Personal Communications 2019:1–28 ..
Wu F , Li X , Sangaiah AK , Xu L , Kumari S , Wu L , Shen J . A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems 2018;82:727–37 .
Das AK , Sutrala AK , Kumari S , Odelu V , Wazid M , Li X . An efficient multi–gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Security and Communication Networks 2016;9(13):2070–92 .
Li X , Peng J , Obaidat MS , Wu F , Khan MK , Chen C . A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor net- work systems. IEEE Syst J 2019 .
Das AK , Kumari S , Odelu V , Li X , Wu F , Huang X . Provably secure user authen- tication and key agreement scheme for wireless sensor networks. Security and Communication Networks 2016;9(16):3670–87 .
O. Samuel, A. B. Omojo, A. M. Onuja, Y. Sunday, P. Tiwari, D. Gupta, G. Hafeez, A. S. Yahaya, O. J. Fatoba, and S. Shamshirband, “Iomt: A covid-19 healthcare system driven by federated learning and blockchain,” IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 2, pp. 823–834, 2022.
S. Uppuluri and G. Lakshmeeswari, “Secure user authentication and key agreement scheme for iot device access control based smart home communications,” Wireless Networks, vol. 29, no. 3, pp. 1333–1354, 2023.
L. Bai, C. Hsu, L. Harn, J. Cui, and Z. Zhao, “A practical lightweight anonymous authentication and key establishment scheme for resourceasymmetric smart environments,” IEEE Transactions on Dependable and Secure Computing, 2022.
DOI: https://doi.org/10.31449/inf.v49i10.5518

This work is licensed under a Creative Commons Attribution 3.0 License.