Lightweight Authentication Scheme for Internet of Things

Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Zonghua Zhang
2019 ◽  
Vol 15 (4) ◽  
pp. 111-122
Author(s):  
Shadi Janbabaei ◽  
Hossein Gharaee ◽  
Naser Mohammadzadeh ◽  
◽  
◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Chien-Ming Chen ◽  
Shuangshuang Liu

The Internet of Things (IoT) is a huge network formed by connecting various information sensing devices through the Internet. Although IoT has been popularized in many fields, connected devices can be used only when network security is guaranteed. Recently, Rana et al. proposed a secure and lightweight authentication protocol for the next-generation IoT infrastructure. They claim that their protocol can resist major security attacks. However, in this study, we prove that their protocol is still vulnerable to offline password guessing attacks and privilege internal attacks. In order to solve these shortcomings, we propose an improved protocol, which is proved to be secure by formal and informal analysis. In addition, after comparing the time and memory consumption with other protocols, we find that our protocol has more advantages.


2022 ◽  
Vol 2022 ◽  
pp. 1-15
Author(s):  
Yujian Zhang ◽  
Yuhao Luo ◽  
Xing Chen ◽  
Fei Tong ◽  
Yuwei Xu ◽  
...  

Internet of Things (IoT) has been ubiquitous in both industrial and living areas, but also known for its weak security. Being as the first defense line against various cyberattacks, authentication is even more critical to IoT applications. Moreover, there has been a growing demand for cross-domain collaboration, leading to an increasing need for cross-domain authentication. Recently, certificate-based authentication schemes have been extensively studied. However, many of these schemes are not efficient in computation, storage, and communication, which are highly required in IoT. In this paper, we propose a lightweight authentication scheme based on consortium blockchain and design a cryptocurrency-like digital token to build trust. Furthermore, trust lifecycle management is performed by manipulating the amount of tokens. The comprehensive analysis and evaluation demonstrate that the proposed scheme is resistant to various common attacks and more efficient than competitor schemes in terms of storage, communication, and authentication cost.


Sign in / Sign up

Export Citation Format

Share Document