Online citations, reference lists, and bibliographies.
← Back to Search

Certificate-Based Anonymous Device Access Control Scheme For IoT Environment

Saurav Malani, J. Srinivas, A. K. Das, K. Srinathan, Minho Jo
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
As the “Internet communications infrastructure” develops to encircle smart devices, it is very much essential for designing suitable methods for secure communications with these smart devices, in the future Internet of Things (IoT) applications context. Due to wireless communication among the IoT smart devices and the gateway node (GWN), several security threats may arise in the IoT environment, including replay, man-in-the-middle, impersonation, malicious devices deployment, and physical devices capture attacks. In this article, to mitigate such security threats, we design a new certificate-based device access control scheme in IoT environment which is not only secure against mentioned attacks, but it also preserves anonymity property. A detailed security analysis using the widely accepted real-or-random (ROR) model-based formal security analysis, informal security analysis, and also formal security verification based on the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool has been performed on the proposed scheme to show that it is secure against various known attacks. In addition, a comprehensive comparative analysis among the proposed scheme and other relevant schemes shows that a better tradeoff among the security and functionality attributes, communication, and computational costs is achieved for the proposed scheme as compared to other schemes.
This paper references
10.1177/1550147716682037
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
A. Braeken (2016)
AVISPA , “ Automated Validation of Internet Security Protocols and Applications , ” 2019 , accessed on March 2019 . [ Online ]
S. M. R. Islam
10.1109/JIOT.2018.2888821
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
M. Wazid (2019)
10.1109/TCE.2009.5174412
Enhanced novel access control protocol over wireless sensor networks
Hyun-Sung Kim (2009)
10.1109/ACCESS.2015.2437951
The Internet of Things for Health Care: A Comprehensive Survey
S. M. Riazul Islam (2015)
10.1109/JCN.2009.6388413
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
L. Hung (2009)
10.1155/2018/6140978
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
Ming Luo (2018)
10.1109/FOCS.2006.25
Cryptography from Anonymity
Y. Ishai (2006)
FutureScape: Worldwide Internet of Things 2017 Predictions, document US40755816
IDC C. MacGillivray et al (2016)
10.1016/j.future.2018.06.027
Taxonomy and analysis of security protocols for Internet of Things
A. K. Das (2018)
10.1109/PRDC.2017.25
Key Management in Internet of Things via Kronecker Product
I. Tsai (2017)
10.6028/nist.sp.800-57pt2r1
Recommendation for Key Management
Elaine B. Barker (2005)
10.1007/3-540-48405-1_25
Differential Power Analysis
Paul C. Kocher (1999)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1109/JIOT.2017.2694844
A Survey on Security and Privacy Issues in Internet-of-Things
Yuchen Yang (2017)
Automated Validation of Internet Security Protocols and Applications
AVISPA (2019)
10.1016/j.comcom.2016.03.007
Practical access control for sensor networks in the context of the Internet of Things
F. Li (2016)
The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA
David von Oheimb (2005)
10.1109/TETC.2016.2606384
A Comprehensive Study of Security of Internet-of-Things
A. Mosenia (2017)
10.1155/2011/412146
A New Design of Access Control in Wireless Sensor Networks
Hui-Feng Huang (2011)
How the Next Evolution of the Internet Is Changing Everything
D. Evans (2011)
Former Cisco CEO John Chambers Predicts 500 Billion Connected Devices by 2025
J. Camhi (2015)
10.1016/j.future.2013.01.010
Internet of Things (IoT): A vision, architectural elements, and future directions
J. Gubbi (2013)
10.1109/MNET.2018.1700460
Big Data Driven Vehicular Networks
Nan Cheng (2018)
10.1109/MCOM.2017.1601162
Enhancing Crowd Collaborations for Software Defined Vehicular Networks
Wei Quan (2017)
10.1109/JIOT.2017.2780232
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
M. Wazid (2018)
10.1109/TC.2002.1004593
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges (2002)
10.1007/BF00196725
Efficient signature generation by smart cards
C. Schnorr (2004)
10.1109/TWC.2011.072511.102283
Distributed Access Control with Privacy Support in Wireless Sensor Networks
Daojing He (2011)
10.1109/ACCESS.2015.2474705
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
Pawani Porambage (2015)
10.1016/j.adhoc.2006.05.014
Access control in wireless sensor networks
Yun Zhou (2007)
10.1049/IP-IFS:20055073
Password-Based Authenticated Key Exchange in the Three-Party Setting
M. Abdalla (2004)
Recommendation for Key Management, Part 1 Rev. 4, document 800–57
E. Barker (2018)
10.1109/JIOT.2017.2707489
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes
Tianyi Song (2017)
An Enhanced Access Control Scheme in Wireless Sensor Networks
S. Chatterjee (2014)
10.1109/JIOT.2018.2877690
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
A. K. Das (2018)
10.1109/TIT.1983.1056650
On the security of public key protocols
D. Dolev (1981)
10.1155/2017/6384186
Holistic Privacy-Preserving Identity Management System for the Internet of Things
J. Bernabé (2017)
10.1109/IIKI.2016.3
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes
Tianyi Song (2016)
10.1007/3-540-46035-7_22
Universally Composable Notions of Key Exchange and Secure Channels
R. Canetti (2002)
10.1109/COMST.2015.2444095
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
Ala Al-Fuqaha (2015)
10.1109/TDSC.2017.2764083
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
M. Wazid (2020)
10.1109/APSCC.2008.116
A New Dynamic Access Control in Wireless Sensor Networks
Hui-Feng Huang (2008)
IDC FutureScape: Worldwide Internet of Things 2017 Predictions
C. MacGillivray (2016)
10.1109/COMST.2015.2388550
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
J. Granjal (2015)
10.1109/COMST.2017.2762345
Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
Jianbing Ni (2018)
10.1016/J.SYSARC.2018.12.005
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
M. Wazid (2019)
10.1109/TIFS.2018.2850299
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Libing Wu (2019)
SPAN, the Security Protocol ANimator for AVISPA
AVISPA (2019)
10.1016/j.csi.2008.05.014
A novel access control protocol for secure sensor networks
Hui-Feng Huang (2009)
10.1109/ACCESS.2017.2676119
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
S. Challa (2017)
10.1007/s10207-012-0162-9
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
A. K. Das (2012)
10.1109/TCE.2010.5505971
On the security of an enhanced novel access control protocol for wireless sensor networks
P. Zeng (2010)
10.1109/TWC.2015.2473165
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
C. Chang (2016)
10.1109/LWC.2018.2879514
Adaptive Transmission Control for Software Defined Vehicular Networks
Wei Quan (2019)
10.1109/TDSC.2018.2828306
Cloud Centric Authentication for Wearable Healthcare Monitoring System
J. Srinivas (2020)



This paper is referenced by
10.3390/s20072049
An Efficient Key Management Technique for the Internet of Things
Tamanna Tabassum (2020)
10.1109/ACCESS.2020.3032680
Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain
Seunghwan Son (2020)
10.1016/j.sysarc.2020.101877
Blockchain-based batch authentication protocol for Internet of Vehicles
Palak Bagga (2020)
10.1016/j.jisa.2020.102662
A Lightweight Signcryption Method for Perception Layer in Internet-of-Things
A. Kumar (2020)
10.1109/ICC40277.2020.9148915
On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications
Sourav Saha (2020)
10.3390/s19245539
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
M. Wazid (2019)
A NOVEL REMOTE ACCESS CONTROL FOR THE REAL-TIME STREAMING DATA OF IP CAMERAS
IP CAMERAS (2020)
10.1002/dac.4570
Simple and secure device authentication mechanism for smart environments using Internet of things devices
M. Hussain (2020)
10.1007/s12083-020-00963-w
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
M. Vivekanandan (2020)
10.1109/TVT.2020.3000576
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment
Basudeb Bera (2020)
10.1016/j.comcom.2020.02.011
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
Basudeb Bera (2020)
10.1007/s12083-020-00973-8
A secure authentication scheme for IoT application in smart home
P. Kumar (2020)
10.1016/j.comcom.2020.08.016
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems
B. D. Deebak (2020)
10.1016/j.iot.2020.100249
Secure key agreement for multi-device home IoT environment
Akash Garg (2020)
10.1109/ACCESS.2020.2995917
BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment
N. Garg (2020)
10.1109/JIOT.2020.2966242
Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment
S. Mandal (2020)
Semantic Scholar Logo Some data provided by SemanticScholar