A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks

2019 ◽  
Vol 6 (3) ◽  
pp. 5485-5499 ◽  
Author(s):  
Kaiping Xue ◽  
Wei Meng ◽  
Shaohua Li ◽  
David S. L. Wei ◽  
Huancheng Zhou ◽  
...  
2019 ◽  
Vol 31 (3) ◽  
pp. 83-96
Author(s):  
Xin Chen ◽  
ZhiQiang Liu ◽  
Jianxiong Wan ◽  
Zhuo Li

Nowadays, the technology of internet of things is developing rapidly, and the application of machine type communication (MTC) is becoming more and more extensive. Meanwhile, the 3rd generation partnership project (3GPP) organization proposes a standard architecture for MTC in LTE-A networks. However, when a large number of MTC devices handover authentication at the same time, the use of 3GPP handover mechanisms takes up more signaling resources, which will cause signaling congestion and vulnerable attacks. To solve this problem, the researchers propose an aggregated handover authentication protocol for MTC in LTE-A networks. Compared with the current 3GPP standards, the scheme can not only avoid signaling congestion, but also support more security. Finally, the researchers use colored petri nets (CPN) to model and analyze the proposed protocol. Simulation results show that the protocol is secure and achievable.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


2017 ◽  
Vol 3 (2) ◽  
pp. 254-263 ◽  
Author(s):  
Chunlei Huo ◽  
Zhixin Zhou ◽  
Kun Ding ◽  
Chunhong Pan

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Da-Zhi Sun ◽  
Ji-Dong Zhong

As an open standard for the short-range radio frequency communications, Bluetooth is suitable for Mobile Crowdsensing Systems (MCS). However, the massive deployment of personal Bluetooth-enabled devices also raises privacy concerns on their wielders. Hence, we investigate the privacy of the unilateral authentication protocol according to the recent Bluetooth standard v5.2. The contributions of the paper are twofold. (1) We demonstrate that the unilateral authentication protocol suffers from privacy weakness. That is, the attacker is able to identify the target Bluetooth-enabled device once he observed the device’s previous transmitted messages during the protocol run. More importantly, we analyze the privacy threat of the Bluetooth MCS, when the attacker exploits the proposed privacy weakness under the typical Internet of Things (IoT) scenarios. (2) An improved unilateral authentication protocol is therefore devised to repair the weakness. Under our formal privacy model, the improved protocol provably solves the traceability problem of the original protocol in the Bluetooth standard. Additionally, the improved protocol can be easily adapted to the Bluetooth standards because it merely employs the basic cryptographic components available in the standard specifications. In addition, we also suggest and evaluate two countermeasures, which do not need to modify the original protocol.


Sign in / Sign up

Export Citation Format

Share Document