Cargando…

An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol

EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitted between sensors in smart lighting control syste...

Descripción completa

Detalles Bibliográficos
Autores principales: Wu, Yi, Feng, Tao
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9460674/
https://www.ncbi.nlm.nih.gov/pubmed/36081172
http://dx.doi.org/10.3390/s22176713
_version_ 1784786804995522560
author Wu, Yi
Feng, Tao
author_facet Wu, Yi
Feng, Tao
author_sort Wu, Yi
collection PubMed
description EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitted between sensors in smart lighting control systems is easily accessible by malicious attackers, attackers can analyze users’ habits based on the intercepted information. This paper analyzed the security of the EnOcean protocol using a formal analysis method based on the colored Petri net (CPN) theory and the Dolev–Yao attacker model and found that the protocol did not anonymize the device identity information and did not have a communication key update mechanism, so an attacker could easily initiate a key compromise impersonation attack (KCIA) after breaking the pre-shared communication key. To address the above security issues, this paper proposed an EnOcean-A protocol with higher security based on the EnOcean protocol. The EnOcean-A protocol introduced a trusted third-party server to send communication keys to communication devices because devices must obtain different communication keys from the trusted third-party server each time they communicated. Thus, this protocol could resist a KCIA and achieve forward security. Meanwhile, the device identity information was anonymized using a homomorphic hash function in the EnOcean-A protocol, and the dynamic update mechanism of the device identity information was added so that an attacker could not obtain the real identity information of the device. Finally, the formal analysis of the EnOcean-A protocol showed that the new protocol could resist a KCIA and ensure the anonymity and untraceability of the communication device, which had higher security compared with the EnOcean protocol.
format Online
Article
Text
id pubmed-9460674
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-94606742022-09-10 An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol Wu, Yi Feng, Tao Sensors (Basel) Article EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitted between sensors in smart lighting control systems is easily accessible by malicious attackers, attackers can analyze users’ habits based on the intercepted information. This paper analyzed the security of the EnOcean protocol using a formal analysis method based on the colored Petri net (CPN) theory and the Dolev–Yao attacker model and found that the protocol did not anonymize the device identity information and did not have a communication key update mechanism, so an attacker could easily initiate a key compromise impersonation attack (KCIA) after breaking the pre-shared communication key. To address the above security issues, this paper proposed an EnOcean-A protocol with higher security based on the EnOcean protocol. The EnOcean-A protocol introduced a trusted third-party server to send communication keys to communication devices because devices must obtain different communication keys from the trusted third-party server each time they communicated. Thus, this protocol could resist a KCIA and achieve forward security. Meanwhile, the device identity information was anonymized using a homomorphic hash function in the EnOcean-A protocol, and the dynamic update mechanism of the device identity information was added so that an attacker could not obtain the real identity information of the device. Finally, the formal analysis of the EnOcean-A protocol showed that the new protocol could resist a KCIA and ensure the anonymity and untraceability of the communication device, which had higher security compared with the EnOcean protocol. MDPI 2022-09-05 /pmc/articles/PMC9460674/ /pubmed/36081172 http://dx.doi.org/10.3390/s22176713 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wu, Yi
Feng, Tao
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
title An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
title_full An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
title_fullStr An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
title_full_unstemmed An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
title_short An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
title_sort anonymous authentication and key update mechanism for iot devices based on enocean protocol
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9460674/
https://www.ncbi.nlm.nih.gov/pubmed/36081172
http://dx.doi.org/10.3390/s22176713
work_keys_str_mv AT wuyi ananonymousauthenticationandkeyupdatemechanismforiotdevicesbasedonenoceanprotocol
AT fengtao ananonymousauthenticationandkeyupdatemechanismforiotdevicesbasedonenoceanprotocol
AT wuyi anonymousauthenticationandkeyupdatemechanismforiotdevicesbasedonenoceanprotocol
AT fengtao anonymousauthenticationandkeyupdatemechanismforiotdevicesbasedonenoceanprotocol