Next Article in Journal
Acoustic Devices for Particle and Cell Manipulation and Sensing
Next Article in Special Issue
Focal-Plane Sensing-Processing: A Power-Efficient Approach for the Implementation of Privacy-Aware Networked Visual Sensors
Previous Article in Journal
Active In-Database Processing to Support Ambient Assisted Living Systems
Previous Article in Special Issue
LiftingWiSe: A Lifting-Based Efficient Data Processing Technique in Wireless Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2014, 14(8), 14786-14805; doi:10.3390/s140814786

Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

1
Department of Ubiquitous IT Graduate School of Design & IT, Dongseo University, Sasang-Gu, Busan 617-716, Korea
2
Division of Computer & Engineering, Dongseo University, Sasang-Gu, Busan 617-716, Korea
*
Author to whom correspondence should be addressed.
Received: 14 May 2014 / Revised: 19 July 2014 / Accepted: 30 July 2014 / Published: 13 August 2014
(This article belongs to the Special Issue Wireless Sensor Networks and the Internet of Things)
View Full-Text   |   Download PDF [766 KB, uploaded 14 August 2014]   |  

Abstract

Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. According to our analysis, Jing et al.’s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. View Full-Text
Keywords: Internet of Things; wireless sensor networks; mutual authentication; access control Internet of Things; wireless sensor networks; mutual authentication; access control
Figures

This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Ndibanje, B.; Lee, H.-J.; Lee, S.-G. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors 2014, 14, 14786-14805.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top