Cargando…

An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things

Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart hea...

Descripción completa

Detalles Bibliográficos
Autores principales: Ahmed, Adel Ali, Ahmed, Waleed Ali
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6749530/
https://www.ncbi.nlm.nih.gov/pubmed/31443608
http://dx.doi.org/10.3390/s19173663
_version_ 1783452300716539904
author Ahmed, Adel Ali
Ahmed, Waleed Ali
author_facet Ahmed, Adel Ali
Ahmed, Waleed Ali
author_sort Ahmed, Adel Ali
collection PubMed
description Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart healthcare, smart transportation, etc. Due to the fact that the IoT devices have limited resources, the cybersecurity approaches that relied on complex and long processing cryptography are not a good fit for these constrained devices. Moreover, the current IoT systems experience critical security vulnerabilities that include identifying which devices were affected, what data or services were accessed or compromised, and which users were impacted. The cybersecurity challenge in IoT systems is to find a solution for handling the identity of the user, things/objects and devices in a secure manner. This paper proposes an effective multifactor authentication (CMA) solution based on robust combiners of the hash functions implemented in the IoT devices. The proposed CMA solution mitigates the authentication vulnerabilities of IoT and defends against several types of attacks. Also, it achieves multi-property robustness and preserves the collision-resistance, the pseudo-randomness, the message authentication code, and the one-wayness. It also ensures the integrity, authenticity and availability of sensed data for the legitimate IoT devices. The simulation results show that CMA outperforms the TOTP in term of the authentication failure rate. Moreover, the evaluation of CMA shows an acceptable QoS measurement in terms of computation time overhead, throughput, and packet loss ratio.
format Online
Article
Text
id pubmed-6749530
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-67495302019-09-27 An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things Ahmed, Adel Ali Ahmed, Waleed Ali Sensors (Basel) Article Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart healthcare, smart transportation, etc. Due to the fact that the IoT devices have limited resources, the cybersecurity approaches that relied on complex and long processing cryptography are not a good fit for these constrained devices. Moreover, the current IoT systems experience critical security vulnerabilities that include identifying which devices were affected, what data or services were accessed or compromised, and which users were impacted. The cybersecurity challenge in IoT systems is to find a solution for handling the identity of the user, things/objects and devices in a secure manner. This paper proposes an effective multifactor authentication (CMA) solution based on robust combiners of the hash functions implemented in the IoT devices. The proposed CMA solution mitigates the authentication vulnerabilities of IoT and defends against several types of attacks. Also, it achieves multi-property robustness and preserves the collision-resistance, the pseudo-randomness, the message authentication code, and the one-wayness. It also ensures the integrity, authenticity and availability of sensed data for the legitimate IoT devices. The simulation results show that CMA outperforms the TOTP in term of the authentication failure rate. Moreover, the evaluation of CMA shows an acceptable QoS measurement in terms of computation time overhead, throughput, and packet loss ratio. MDPI 2019-08-23 /pmc/articles/PMC6749530/ /pubmed/31443608 http://dx.doi.org/10.3390/s19173663 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ahmed, Adel Ali
Ahmed, Waleed Ali
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_full An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_fullStr An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_full_unstemmed An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_short An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
title_sort effective multifactor authentication mechanism based on combiners of hash function over internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6749530/
https://www.ncbi.nlm.nih.gov/pubmed/31443608
http://dx.doi.org/10.3390/s19173663
work_keys_str_mv AT ahmedadelali aneffectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings
AT ahmedwaleedali aneffectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings
AT ahmedadelali effectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings
AT ahmedwaleedali effectivemultifactorauthenticationmechanismbasedoncombinersofhashfunctionoverinternetofthings