Cargando…

Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the net...

Descripción completa

Detalles Bibliográficos
Autores principales: Ndibanje, Bruce, Lee, Hoon-Jae, Lee, Sang-Gon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4179010/
https://www.ncbi.nlm.nih.gov/pubmed/25123464
http://dx.doi.org/10.3390/s140814786
_version_ 1782336999421640704
author Ndibanje, Bruce
Lee, Hoon-Jae
Lee, Sang-Gon
author_facet Ndibanje, Bruce
Lee, Hoon-Jae
Lee, Sang-Gon
author_sort Ndibanje, Bruce
collection PubMed
description Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
format Online
Article
Text
id pubmed-4179010
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-41790102014-10-02 Security Analysis and Improvements of Authentication and Access Control in the Internet of Things Ndibanje, Bruce Lee, Hoon-Jae Lee, Sang-Gon Sensors (Basel) Article Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. MDPI 2014-08-13 /pmc/articles/PMC4179010/ /pubmed/25123464 http://dx.doi.org/10.3390/s140814786 Text en © 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Ndibanje, Bruce
Lee, Hoon-Jae
Lee, Sang-Gon
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
title Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
title_full Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
title_fullStr Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
title_full_unstemmed Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
title_short Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
title_sort security analysis and improvements of authentication and access control in the internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4179010/
https://www.ncbi.nlm.nih.gov/pubmed/25123464
http://dx.doi.org/10.3390/s140814786
work_keys_str_mv AT ndibanjebruce securityanalysisandimprovementsofauthenticationandaccesscontrolintheinternetofthings
AT leehoonjae securityanalysisandimprovementsofauthenticationandaccesscontrolintheinternetofthings
AT leesanggon securityanalysisandimprovementsofauthenticationandaccesscontrolintheinternetofthings