Volume 19, Issue 4 (3-2023)                   JSDP 2023, 19(4): 85-94 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Alizadeh J, Bagheri N. Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT). JSDP 2023; 19 (4) : 7
URL: http://jsdp.rcisp.ac.ir/article-1-1175-en.html
Abstract:   (533 Views)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication and Key Agreement (AKA) protocol is a tool to achieve authenticity and agree on a secret key to reach confidentiality. Therefor using a secure AKA protocol, one can establish the mentioned security. In the last years, several articles have discussed AKA protocols in the WSN. For example, in 2014, Turkanovic et al. proposed a new AKA scheme for the heterogeneous ad-hoc WSN. In 2016, Sabzinejad et al. presented an improved one. In 2017, Jiang et al. introduced a secure AKA protocol. Some other AKA protocols have presented in the last three years. All the mentioned protocols are lightweight ones and need minimum resources and try to decrease the computation and communication costs in the WSN context.
In 2019, Janababaei et al. proposed an AKA scheme in the WSN for the IoT applications, in the journal of Signal and Data Processing (JSDP). In the context of efficiency, the protocol only uses a hash function, bitwise XOR, and concatenation operation. Hence, it can be  considered as a lightweight protocol. The authors also discussed the security of their scheme and claimed that the proposed protocol has the capability  to offer anonymity and trust and is secure against traceability, impersonation, reply and man in the middle attacks. However, despite their claims, this research highlights some vulnerabilities in that protocol, for the first time to the best of our knowledge. More precisely, we showe that a malicious sensor node can find the secret parameters of another sensor node when it establishes a session with the victimized sensor. Besides, an adversary can determine any session key of two sensor nodes, given only a known session key of them. We also show that the protocol could not satisfy the anonymity of the sensor nodes. Other attacks which influence the Janababaei et al.’s scheme, are impersonation attack on the sensor nodes and cluster heads and also the man in the middle attack.
In this paper we find that the main weaknesses of the Janababaei et al.’s protocol are related to computation of the session key, . We also propose a simple remedy to enhance the security of the Janababaei et al.’s protocol. An initial attempt to improve the protocol is using a hash function on the calculated key, . This suggestion is presented to enhance the security of the protocol against the observed weaknesses in this paper; but it does not mean that there are no other security issues in the protocol. Therefore, modification and improvement of the Janababaei et al.’s protocol such that it provides other security features can be considered in the future research of this paper. Besides, since in this paper we focus on the security of the protocol, then the efficiency of it was not discussed. Therefore one can consider the modification of the message structure of the protocol to reduce the computational and telecommunication costs of it as another future work in the context of this paper.
Article number: 7
Full-Text [PDF 606 kb]   (191 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2020/09/14 | Accepted: 2021/12/11 | Published: 2023/03/20 | ePublished: 2023/03/20

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing