Article
Computer Science, Information Systems
Muhammad Tanveer, Ghulam Abbas, Ziaul Haq Abbas, Muhammad Bilal, Amrit Mukherjee, Kyung Sup Kwak
Summary: This article introduces a lightweight user AKE scheme (LAKE-6SH) for smart home networks, which establishes private session keys between users and network entities to achieve authenticity of RUs using the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. The scheme has been informally validated to be secure against various security attacks, and further validated formally through the random oracle model and Scyther validation. Additionally, LAKE-6SH is shown to provide better security features with low communication and computational overheads.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yanbin Zhang, Ke Cheng, Fazlullah Khan, Ryan Alturki, Rahim Khan, Ateeq Ur Rehman
Summary: A mutual authentication scheme, combining MAC address and EAODV-enabled scheme, is presented in this paper for establishing secure device-to-device communication sessions in IoT networks to ensure the security of edge-enabled smart cities. Simulation results have verified that the proposed scheme outperforms existing schemes in terms of processing and communication overheads.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Jiangfeng Sun, Fazlullah Khan, Junxia Li, Mohammad Dahman Alshehri, Ryan Alturki, Mohammad Wedyan
Summary: This article presents a mutual authentication scheme for devices-to-server and vice versa in the operational Internet of Medical Things to ensure secure communication sessions among multiple mobile devices and servers. By introducing an offline phase for registration process, blocking potential intruder devices, and using encryption and decryption schemes, data reliability is ensured during communication sessions.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Mohd Shariq, Karan Singh, Chhagan Lal, Mauro Conti, Tayyab Khan
Summary: Internet of Things (IoT) technologies have rapidly evolved, and RFID technology is a core technology used in various IoT applications. However, privacy and security concerns in RFID systems have been reported. To address these issues, an Efficient, Secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS) is proposed, which effectively resists known attacks and provides high security at low cost.
Article
Telecommunications
Dheerendra Mishra, Komal Pursharthi, Purva Rewal
Summary: This paper introduces an innovative quantum secure and efficient authentication and key agreement (AKA) scheme based on RLWE, providing robust authentication for cloud and autonomous vehicles. Through a comprehensive comparative study, the proposed scheme is proven to be more efficient and suitable for the post-quantum era.
VEHICULAR COMMUNICATIONS
(2023)
Article
Chemistry, Multidisciplinary
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Junchao Ma, Dhafer G. Honi, Abdulla J. Y. Aldarwish, Iman Qays Abduljaleel
Summary: This paper discusses the security issues in smart home networks and proposes a symmetric key authentication scheme that reduces communication, storage, and computation complexities by leveraging cryptographic primitives. It also addresses various attacks and exhibits good performance in empirical experiments.
APPLIED SCIENCES-BASEL
(2022)
Article
Computer Science, Information Systems
Ali Dorri, Clemence Roulin, Shantanu Pal, Sarah Baalbaki, Raja Jurdak, Salil S. Kanhere
Summary: This article explores the impact of user deanonymization on IoT-based blockchain and demonstrates that machine learning algorithms can successfully classify transactions. To enhance user anonymity, the article proposes multiple obfuscation methods.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Arwa Badhib, Suhair Alshehri, Asma Cherif
Summary: The Internet of Things (IoT) is a heterogeneous environment connecting billions of devices, making it a prime target for attackers and facing threats such as impersonation and DoS attacks. Continuous authentication is crucial for session security, especially for device-to-device authentication to mitigate DoS threats while preserving privacy. This research proposes a secure protocol leveraging device features for continuous authentication, which proves robust against security threats and maintains reasonable computational costs.
Article
Automation & Control Systems
Maryam Zia, Mohammad S. Obaidat, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Shehzad Ashraf Chaudhry
Summary: Wireless Body Area Network (WBAN) is a crucial application of IoT, used to gather healthcare information from patients. Ensuring the security of this sensitive information is crucial. This article presents a secure and lightweight authentication protocol for WBAN, which outperforms other competing protocols in terms of scalability, security, and lightweight design. The protocol is proven to be resistant to major attacks and offers improved computation and communication costs efficiency of 20.3% and 12.3% respectively compared to competing protocols. The protocol's practical performance is also evaluated using the NS3 simulation tool.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Garima Singh
Summary: IoMT has gained popularity in the healthcare industry and is expected to expand beyond clinics and hospitals in the future. However, security remains a major concern as cybercriminals constantly target healthcare facilities. This research proposes a secure authentication and key agreement protocol to enhance IoMT security.
INTERNET OF THINGS
(2023)
Article
Chemistry, Analytical
Fariza Sabrina, Nan Li, Shaleeza Sohail
Summary: This paper proposes a device identity management approach for blockchain-based IoT systems, ensuring data security and easy access through time-based identification and blockchain application.
Article
Chemistry, Analytical
JoonYoung Lee, MyeongHyun Kim, KiSung Park, SungKee Noh, Abhishek Bisht, Ashok Kumar Das, Youngho Park
Summary: With the increasing adoption of IoT, various IoT environments are being generated, and data access control and privacy protection are essential in these environments. Ciphertext-policy attribute-based encryption (CP-ABE) technology is used to address these requirements, and blockchain is studied to prevent cloud server failures and support data auditing. However, authentication and key agreement are not specified in these systems. Therefore, we propose a data access control and key agreement scheme using CP-ABE in a blockchain-based system, which ensures data security and provides data nonrepudiation, accountability, and verification functions. The proposed protocol is safer and more efficient than other protocols, making it suitable for practical IoT environments.
Article
Computer Science, Information Systems
Vincent Omollo Nyangaresi, Hend Muslim Jasim, Keyan Abdul-Aziz Mutlaq, Zaid Ameen Abduljabbar, Junchao Ma, Iman Qays Abduljaleel, Dhafer G. Honi
Summary: This paper presents an elliptic curve cryptography and symmetric key-based protocol for unmanned aerial vehicle communication, aiming to address the security of sensitive data. The protocol provides features such as mutual authentication, session key agreement, untraceability, anonymity, and various key secrecy properties. Performance evaluation shows that the protocol has low computation, storage, and communication complexities.
Article
Computer Science, Information Systems
Sirisha Uppuluri, G. Lakshmeeswari
Summary: The upcoming paradigm in Internet of Things (IoT) based applications aims to improve interactional communication strategies between devices in smart home systems. Security measures, such as authentication and access control, are vital to ensure secure communication. The proposed protocol, Modified Honey Encryption using Inverse Sampling-Conditional Probability Model Transform (MHE-IS-CPMT) with Elliptic Curve Cryptography (ECC), provides secure authentication and key agreement. It includes steps such as initialization, registration, login and data access request, authentication and session key agreement, and key update. The protocol ensures secure device registration, user authentication, and key management, offering greater security than existing methods.
Article
Computer Science, Information Systems
Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Lianhai Wang, Debiao He
Summary: Internet of Vehicles (IoV) is an emerging technology for transportation systems, but security and privacy remain key concerns. Existing solutions have vulnerabilities, so designing secure and efficient solutions is still challenging. This article analyzes the weaknesses of a proposed authentication protocol and presents an improved protocol called SeMAV, which uses passwords and smart cards for enhanced security and provides security proofs against common attacks.
IEEE INTERNET OF THINGS JOURNAL
(2022)