Geometric Authentication Mechanism for Enhancing Security in IoT Environment
Abstract
:1. Introduction
- Lightweight authentication: The computational performance of our scheme is better than the traditional authentication schemes (e.g., asymmetric or symmetric encryption scheme) because our scheme uses only a hash function and arithmetic.
- Three-factor authentication: A higher-entropy password increases the difficulty in brute forcing it. Many papers have proven that the three-factor authentication scheme has better security (i.e., higher password entropy) and robustness.
- Reduced IGW computing load: Many authentication methods require full participation of the IGW. However, in an IoT environment, the number of IoT devices is large. Therefore, previous schemes are not suitable for use in an IoT environment because the IGW easily suffers from the single-point failure problem due to a distributed denial-of-service (DDoS) attack. In our scheme, GAME supports the fast error detection process on the client side. If the user access is illegal, the smartphone immediately detects an error event and then rejects the login. In this way, the computational load of the IGW can be effectively reduced.
2. Related Work
2.1. User Requirements
- Secure and simple password selection and modification: The system should enable users to select and modify their passwords easily and securely. This means that the user can change their password without the help of a trusted third party after having ensured the legality of the cardholder.
- Registration only once: The user must register only once with the Central Authority (CA) and may then access a variety of application servers. Additionally, the single registration may reduce the network load and the CA overhead.
- Anonymity: User privacy has been increasingly brought to the attention of industry and academia. Therefore, anonymous authentication implies verifying that a user is not using the real identity to perform the authentication procedure.
2.2. System Requirements
- Efficiency: Due to the limited computing power of mobile devices, the communication and computing costs on mobile devices must be lightweight.
- Integrity: The system must ensure the integrity of the message. This means that, when the data is modified, the system will find out and authentication fails.
- Session key protocol: After the authentication process, a session key will be generated between the mobile device and the IGW to provide secure communication and achieve forward secrecy.
- Mutual authentication: The IGW must verify that the user is legitimate, and the user must also ensure that the IGW is not forged. Therefore, the authentication system needs a mutual authentication process.
- No verification table: In most applications, the CA stores the user’s password table, which can cause the verifier to be stolen. Therefore, the design solution should avoid maintaining password verification tables for users.
2.3. Existing Authentication Schemes
3. Proposed Scheme
3.1. Registration Procedure
3.2. Login Procedure
3.3. Authentication Procedure
3.4. Password Change Procedure
4. Analysis
4.1. Definition
- A fragile key has a very low entropy value (e.g., only a password is used to protect access), and an attacker can guess the user’s password within polynomial time. On the contrary, a strong key usually has a high entropy value (e.g., password plus biometric information and mobile phone), such that the attacker cannot guess the user password within polynomial time [14]. Additionally, any two people cannot have the same biometric information.
- In this research, the hash function is a one-way collision-free hash function (e.g., SHA-512 [32]). When the value of x is given, this hash function can easily calculate h(x). However, if the value of h(x) is given, it is difficult to push back x without incurring a high computational cost.
- During the login process, this secure hardware has retrial restrictions to prevent attackers from using brute force cracking techniques to guess the user’s password.
4.2. Security Analysis
- Higher security level: Many papers have already proven that the security of the three-factor authentication scheme is stronger than the security of the two-factor authentication scheme.
- Anonymity and identity protection: In the login procedure, the user’s original name is converted into an alias (e.g., AIDi = ri∙h(IDi)). The generation of the alias is based on a random number (i.e., Step 4 of the login procedure). The random number generated by each login process is different. Therefore, the attacker cannot know the original identity of the user without knowing the random number ri. In addition, our anonymity mechanism is a dynamic identity process. In the registration phase, the SIM card does not store the identity of the user. Therefore, the attacker cannot retrieve the user identity, even if the attacker obtains the SIM card. In GAME, we use a hash function to protect the identity of the user (i.e., h(IDi)).
- Resistance to replay attack: In the login procedure, the login request is rejected if an attacker resends {AIDi, Ai, Ci, T′} to the IGW. Since T′ is inconsistent with the T in Ci, it is different from Ci′. Thus, our method can resist replay attacks. In the authentication procedure, GAME can still resist replay attacks since the message contains the random number. The random number generated is different each time. Therefore, the authentication process will not succeed if an attacker intercepts and replays the authentication message.
- Choose and change passwords easily: Users can select and modify passwords without participating in the CA, which is very convenient for users. Note that this procedure can still be considered a security issue. When users modify their passwords, they must succeed in verification before they execute the password change procedure.
- Fast error detection: In our method, the fast error detection process is performed only on the client side and does not require the IGW to assist in authentication. Therefore, this stage does not consume network transmission resources and IGW computing resources. In the login and password change process, if an attacker tries to guess the password or enters wrong biometric data, the mobile phone can immediately detect the input error (i.e., Step 2 in the login procedure and Step 2 in the password change procedure), and then perform error reporting and lock the card.
- Resistance to offline password guessing attacks: In previous studies, if an attacker captured consecutive login messages {AIDi1, Ai, Ci1, T1} and {AIDi2, Ai, Ci2, T2} at the time points of T1 and T2, they could try to guess the user’s PWi and use the retrieved information to verify their guess. Then, they may calculate the point riw′ = (0,h(PWi′⊕BIOi)) and calculate the intermediate point Bi′ between riw′ and Ai. In addition, the attacker can calculate this riT1′ = (0,h(h(PWi′⊕BIOi)⊕h(T1))) and construct the line LWT1′ passing through the two points of Ci1 and riT1′. Similarly, the attacker can calculate the point riT2′ and the construction line LWT2′. Next, they can compare Bi′ with the intersection of LWT1′ and LWT2′, Bi″. If the values are equal, this means that the password PWi′ guessed by the attacker is correct. However, in our method, the attacker cannot retrieve these values (i.e., riw′, riT1′, and riT2′) because the attacker does not have the user’s biometric BIOi. Thus, our method can resist offline password guessing attacks.
- Resistance to forgery attacks: Although the attacker can intercept the login message {AIDi, Ai, Ci, T}, they cannot forge a valid login message {AIDi, Ai, Ci′, T′} to pass the authentication process. This is because the attacker does not know h(PWi⊕BIOi) and, thus, cannot calculate the point Bi and the corresponding point riT′ = (0, h(h(PWi⊕BIOi)⊕h(T′))). Of course, the attacker will not be able to correctly re-establish the line LWT. Therefore, our solution can resist forgery attacks.
- Resistance to stolen smart device: When the attacker steals the smart device of a user, the attacker still cannot be authenticated successfully. This is because the attacker cannot provide valid biometric identification in login phase. Moreover, the biometric information of the user is not directly stored on the smart device.
- Resistance to server overloading attacks: In previous methods, the entire authentication procedure was executed on the server, making the server vulnerable to overload attacks. Assuming that the user’s mobile phone is stolen by an attacker, in the previous method, the attacker could deduce the user’s identity through intercepted messages. Even if the attacker types in the wrong password, a large number of malicious authentication request messages can be generated on the server. These malicious authentication request messages will cause server computing overload. However, this situation cannot happen with our method, because (i) our method supports the authentication of biometric information, and (ii) our method supports fast error detection. Therefore, when the user enters the wrong ID, password, or biometric message, the mobile phone will not generate a malicious authentication request message to the server.
- Mutual authentication: A mutual authentication procedure is supported by our authentication method. The server needs to verify that the user is legitimate, and the user also needs to ensure that the server is not forged. When mutual authentication is successful, the security of the overall system can be ensured.
- Session key generation: After the authentication process, a session key is generated between the user and the IGW to provide secure communication. The IGW responds with a message {SIDj, M1, M2} to the mobile phone. After the mobile phone receives the message, it calculates h(r1), takes out r2, and then checks whether h(SIDj||r2) is equal to M2. If it is correct, the session key SKij = (r1||r2) is generated, and the encrypted message SKij⊕h(r2) is sent to the IGW. The session key is generated from two random numbers through a hash function; thus, each session key is different and cannot be pushed back.
4.3. Comparison with Other Schemes
4.4. Computation Analysis
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chuang, M.-C.; Chen, M.C. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 2014, 41, 1411–1418. [Google Scholar] [CrossRef]
- AL-Turjman, F.; Deebak, D.B. Seamless authentication: For IoT-big data technologies in smart industrial application systems. IEEE Trans. Ind. Inform. 2021, 17, 2919–2927. [Google Scholar]
- Wu, T.-C. Remote login authentication scheme based on a geometric approach. Comput. Commun. 1995, 18, 959–963. [Google Scholar] [CrossRef]
- Hwang, M.-S. Cryptanalysis of a remote login authentication scheme. Comput. Commun. 1999, 22, 742–744. [Google Scholar] [CrossRef]
- Chien, H.-Y.; Jan, J.-K.; Tseng, Y.-M. A modified remote login authentication scheme based on geometric approach. J. Syst. Softw. 2001, 55, 287–290. [Google Scholar] [CrossRef]
- Chang, C.-C.; Lin, I.-C. Cryptanalysis of the modified remote login authentication scheme based on a geometric approach. Informatica 2005, 16, 37–44. [Google Scholar] [CrossRef]
- Ku, W.-C.; Chang, S.-T.; Chen, H.-H.; Tsaur, M.-J. Weakness and simple improvement of a password authentication scheme based on geometric approach. In Proceedings of the IEEE Conference on Local Computer Networks (LCN), Sydney, Australia, 17 November 2005; pp. 472–473. [Google Scholar]
- Chuang, M.-C.; Lee, J.-F. An anonymous remote user authentication scheme based on a geometric approach for wireless networks. In Proceedings of the IEEE International Conference on Consumer Electronics, Communications and Networks (CECNet), Xianning, China, 16–18 April 2011; pp. 1015–1018. [Google Scholar]
- Lee, J.K.; Ryu, S.R.; Yoo, K.Y. Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 2002, 38, 554–555. [Google Scholar] [CrossRef]
- Ku, W.; Chang, S.; Chiang, M. Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards. Electron. Lett. 2005, 41, 240–241. [Google Scholar] [CrossRef]
- Chang, C.-C.; Lin, I.-C. Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Oper. Syst. Rev. 2004, 38, 91–96. [Google Scholar] [CrossRef]
- Lin, C.-H.; Lai, Y.-Y. A flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces 2004, 27, 19–23. [Google Scholar] [CrossRef]
- Mitchell, C.J.; Tang, Q. Security of the Lin-Lai Smart Card Based User Authentication Scheme, Technical Report. 2005. Available online: http://www.rhul.ac.uk/mathematics/techreports (accessed on 1 May 2021).
- Fan, C.-I.; Lin, Y.-H. Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inform. Forensics Secur. 2009, 4, 933–945. [Google Scholar] [CrossRef]
- Khan, M.K.; Zhang, J. An efficient and practical fingerprint-based remote user authentication scheme with smart cards. In Springer Lecture Notes in Computer Science, Proceedings of the International Conference on Information Security Practice and Experience, Hangzhou, China, 11–14 April 2006; Springer: Berlin, Germany, 2006; pp. 260–268. [Google Scholar]
- Khan, M.K.; Zhang, J.; Wang, X. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 2008, 35, 519–524. [Google Scholar] [CrossRef]
- Xu, J.; Zhu, W.; Feng, D. Improvement of a fingerprint-based remote user authentication scheme. In Proceedings of the IEEE International Conference on Information Security and Assurance (ISA), Busan, Korea, 24–26 April 2008; pp. 87–92. [Google Scholar]
- Li, C.-T.; Hwang, M.-S. An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 2010, 33, 1–5. [Google Scholar] [CrossRef]
- Mishra, D.; Das, A.K.; Mukhopadhyay, S. A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl. 2014, 41, 8129–8143. [Google Scholar] [CrossRef]
- Lu, Y.; Li, L.; Yang, X.; Yang, Y. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS ONE 2015, 10, e0126323. [Google Scholar] [CrossRef]
- Lu, Y.; Li, L.; Peng, H.; Yang, Y. A biometrics and smart cards-based authentication scheme for multi-server environments. Secur. Commun. Netw. 2015, 8, 3219–3228. [Google Scholar] [CrossRef]
- Dammak, M.; Boudia, O.R.M.; Messous, M.A.; Senouci, S.M.; Gransart, C. Token-based lightweight authentication to secure IoT networks. In Proceedings of the IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–4. [Google Scholar]
- Gupta, A.; Tripathi, M.; Shaikh, T.J.; Sharma, A. A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput. Netw. 2019, 149, 29–42. [Google Scholar] [CrossRef]
- Lyu, Q.; Zheng, N.; Liu, H.; Gao, C.; Chen, S.; Liu, J.J.I.A. Remotely access “My” smart home in private: An antitracking authentication and key agreement scheme. IEEE Access 2019, 7, 41835–41851. [Google Scholar]
- Ma, M.; He, D.; Wang, H.; Kumar, N.; Choo, K.-K.R. An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 2019, 6, 8065–8075. [Google Scholar] [CrossRef]
- Renuka, K.M.; Kumari, S.; Zhao, D.; Li, L. Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems. IEEE Access 2019, 7, 51014–51027. [Google Scholar] [CrossRef]
- Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 2019, 14, 39–50. [Google Scholar] [CrossRef]
- Shuai, M.; Yu, N.; Wang, H.; Xiong, L. Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 2019, 86, 132–146. [Google Scholar] [CrossRef]
- Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Park, Y. An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 2020, 20, 1215. [Google Scholar] [CrossRef] [Green Version]
- Xiang, A.; Zheng, J. A situation-aware scheme for efficient device authentication in smart grid-enabled home area networks. Electronics 2020, 9, 989. [Google Scholar] [CrossRef]
- Oh, J.; Yu, S.; Lee, J.; Son, S.; Kim, M.; Park, Y. A secure and lightweight authentication protocol for IoT-based smart homes. Sensors 2021, 21, 1–24. [Google Scholar]
- NIST, U.S. Department of Commerce. Secure Hash Standard, U.S. Federal Information Processing Standard (FIPS); NIST, U.S. Department of Commerce: Gaithersburg, MD, USA, 2002. [Google Scholar]
- AAEON. Available online: http://www.aaeon.com/tw/ (accessed on 1 March 2021).
Symbol | Description |
---|---|
BIOi | Biometric information of user i |
IDi | The public identification of a user i |
AIDi | The alias of user i |
SIDj | The public identification of an IGW j |
(x0,y0) | A secret point stored in the IoT gateway (IGW) and the central authority (CA) |
ri | A random number i |
T | The current timestamp |
⊕ | The bitwise XOR operator |
h( ) | A one-way collision-resistant hash function |
|| | The combination of strings |
PWi | The password of user i |
P | A large prime |
SKij | The session key between i and j |
GAME | Shuai et al. [28] | Banerjee et al. [29] | Xiang and Zheng [30] | |
---|---|---|---|---|
Three-factor | Y | N | Y | N |
Identity protection | Y | Y | Y | N |
Anonymity | Y | Y | N | N |
Resistance to replay attacks | Y | Y | Y | Y |
Choose and change passwords easily | Y | Y | Y | Y |
Fast error detection | Y | Y | Y | Y |
Resistance to offline password guessing attacks | Y | N | Y | Y |
Resistance to forgery attacks | Y | Y | Y | Y |
Resistance to stolen smart device | Y | - | N | N |
Resistance to server overloading attacks | Y | Y | Y | Y |
Session key agreement | Y | Y | N | N |
Mutual authentication | Y | Y | N | N |
Operation | Microseconds |
---|---|
RSA 1024 encryption | 6709 |
RSA 1024 decryption | 280 |
RSA 1024 signature | 7100 |
RSA 1024 verification | 270 |
ECC point multiplication | 75 |
AES 256 encryption | 1.6 |
AES 256 decryption | 1.6 |
Fuzzy extractor function | 7 |
SHA-1 | 1 |
SHA-512 | 1.2 |
Arithmetic | 0.5 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chuang, M.-C.; Yen, C.-C. Geometric Authentication Mechanism for Enhancing Security in IoT Environment. Symmetry 2021, 13, 1369. https://doi.org/10.3390/sym13081369
Chuang M-C, Yen C-C. Geometric Authentication Mechanism for Enhancing Security in IoT Environment. Symmetry. 2021; 13(8):1369. https://doi.org/10.3390/sym13081369
Chicago/Turabian StyleChuang, Ming-Chin, and Chia-Cheng Yen. 2021. "Geometric Authentication Mechanism for Enhancing Security in IoT Environment" Symmetry 13, no. 8: 1369. https://doi.org/10.3390/sym13081369
APA StyleChuang, M. -C., & Yen, C. -C. (2021). Geometric Authentication Mechanism for Enhancing Security in IoT Environment. Symmetry, 13(8), 1369. https://doi.org/10.3390/sym13081369