2019
DOI: 10.1002/ett.3676
|View full text |Cite
|
Sign up to set email alerts
|

A multi‐attack resilient lightweight IoT authentication scheme

Abstract: Majority of the devices in the Internet of Things (IoT) are deployed in an environment that is susceptible to cyber-attacks. Due to the resource-constraint nature of IoT, it is very hard to meet the security challenges that arise due to the deployment of IoT devices in the unsecure environment. In this context, the authentication of IoT devices is one of the core challenges. Many protocols have been designed to address and overcome the security issues that stem from the authentication failure. However, many of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 37 publications
(36 citation statements)
references
References 27 publications
0
32
0
Order By: Relevance
“…The overhead of Srinivas et al 21 is 29 T h , Dhillon and Kalra 11 is 22 T h , Qiu and Ma 8 is 25 T h , Turkanovi? et al 12 is 19 T h , Adeel et al 24 is 19 T h , and Dhillon and Kalra 25 is 22 T h whereas our proposed scheme consume total of 18 T h as shown in Table 3.…”
Section: Results Analysismentioning
confidence: 91%
“…The overhead of Srinivas et al 21 is 29 T h , Dhillon and Kalra 11 is 22 T h , Qiu and Ma 8 is 25 T h , Turkanovi? et al 12 is 19 T h , Adeel et al 24 is 19 T h , and Dhillon and Kalra 25 is 22 T h whereas our proposed scheme consume total of 18 T h as shown in Table 3.…”
Section: Results Analysismentioning
confidence: 91%
“…The security properties of LAKD protocol and the other schemes for M2M communication were analyzed to obtain their attack resistance. Furthermore, articles that have a security analysis of the comparison schemes were reviewed to complete the information, such as [28][29][30]. In Table 8 is summarized the analysis results of common attacks, as was done in [44,45,64,65].…”
Section: Attack Resistance Comparisonmentioning
confidence: 99%
“…Take Esfahani et al's protocol, for example. It has been found vulnerable to modification, session and long-term key disclosure, privileged insider, impersonation, DoS, and tracking attacks in [28][29][30]. Concerning Joshitta et al, some of its security vulnerabilities are the use of the same session key between sessions, and its disclosure.…”
Section: Attack Resistance Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In the area of Industrial IoT applications, we can distinguish the recent work of [6] in which a lightweight authentication and key distribution (LAKD) scheme has been proposed built of only hash functions, xoring, addition, and subtraction. Their work was inspired on the protocol of [7] in which several weaknesses have been identified by [8][9][10], being a lack of protection against tracking, offline identity guessing, impersonation, and replay attacks. Their scheme [6] consists of four communication phases and a lot of hash calls should be made at the sensor node.…”
Section: Related Workmentioning
confidence: 99%