Abstract
The Internet of Things (IoT) with cloud services are important functionalities in the latest IoT systems for providing various convenient services. These cloud-enabled IoT environments collect, analyze, and monitor surrounding data, resulting in the most effective handling of large amounts of heterogeneous data. In these environments, secure authentication with a key agreement mechanism is essential to ensure user and data privacy when transmitting data between the cloud server and IoT nodes. In this study, we prove that the previous scheme contains various security threats, and hence cannot guarantee essential security requirements. To overcome these security threats, we propose an improved authentication and key agreement scheme for cloud-enabled IoT using PUF. Furthermore, we evaluate its security by performing informal, formal (mathematical), and simulation analyses using the AVISPA tool and ROR model. The performance and security properties of our scheme are subsequently compared with those of other related schemes. The comparison confirms that our scheme is suitable for a practical cloud-enabled IoT environment because it provides a superior security level and is more efficient than contemporary schemes.
1. Introduction
The Internet of Things (IoT) and advanced communication technologies are opening up a novel networking paradigm that connects various devices to a public network. By 2025, the number of IoT devices and their market size are estimated to increase to approximately 30 billion [1] and 1.6 trillion [2], respectively. With the expansion of IoT infrastructure, IoT-based smart systems can support social networks in various areas, such as telemedicine, finance, smart grids, intelligent transport systems, and businesses. In these environments, IoT devices analyze the surrounding circumstances, collect data, and send them to service providers to provide various IoT services to users. However, IoT devices generally have limited computing power and storage resources, and do not handle a large amount of heterogeneous data.
Cloud-enabled IoT is known to be the most effective system for handling massive amounts of data generated by IoT devices [3]. In cloud-enabled IoT, a cloud server (CS) has sufficient ability to handle massive amounts of data and has the required storage capability for providing services. IoT devices transfer the collected data by monitoring the surrounding circumstances to utilize the storage and computing power of the CS. Thus, the CS collects IoT data and analyzes it to provide cost-effective and convenient services. Cloud-enabled IoT with communication technologies has become extremely important in human life, and thus the need for security and privacy has become essential for users. This is because of the various sensitive information that IoT data contains, such as health, finance, location, and behavior. Moreover, the Internet is an open channel that causes severe security issues. An adversary can easily forge or intercept data transmitted in an open channel and access user data stored in the CS. Therefore, it is necessary to authenticate entities that attempt to access data.
Numerous authenticated key agreement (AKA) schemes have been presented to guarantee user privacy and data security [4,5,6,7,8,9,10,11]. However, these schemes do not resist physical capture attacks using differential power analysis because IoT devices are not equipped with tamper-proof modules. Although some schemes assume that the devices in their scheme are equipped with tamper-proof modules, they do not present detailed tamper-resistant techniques to prevent physical capture attacks.
A physically unclonable function (PUF) [12] is a novel solution for preventing physical capture attacks targeting devices. The PUF module extracts the unique value corresponding to the inputs from an integrated circuit (IC) that is deployed during the manufacturing process. It has strong and valuable properties, such as tamper-proofing, unpredictable results, and low power consumption, which can be applied to lightweight authentication and identification protocols. In recent years, several PUF-based AKA schemes have been proposed [13,14,15] to ensure the security of the physical layer. In PUF-based AKA schemes, the PUF module can generate the secret value using challenge-response methods from IC which has different physical characteristics. After performing a fuzzy extractor for correcting the noise of a PUF value, it can be applied for AKA schemes as a secret parameter.
In this paper, we cryptanalyze the security flaws of previous schemes and propose an improved AKA scheme for cloud-enabled IoT using a challenge-response-based PUF, called iAKA-CIoT. Additionally, we analyze its security using formal (mathematical) and informal analyses, and conduct a comparative analysis on iAKA-CIoT and other contemporary schemes. Finally, we simulate our scheme to prove that it is secure against potential attacks.
Motivations and Contributions
The main goal of this study was to propose an improved AKA scheme for IoT using PUF to overcome the security threat of the previous scheme [6,10,11,16,17]. In the previous schemes, an attacker can easily disguise a legal user and compute a correct session key between the participants of the protocol. Moreover, the devices of their scheme can be easily compromised by an attacker using physical capture attack. In our AKA scheme, an adversary cannot compromise the IoT devices because they are protected by PUF modules. We perform informal and formal (mathematical) security analysis, which proves that our scheme meets the essential security requirements and session key security in a threat model. We also conducted a formal simulation analysis using the “automated validation of internet security protocols and applications” (AVISPA) [18] to prove its security and suitability for deployment in an open channel. Finally, the comparative analysis is carried out to evaluate performances and security properties compared with the related schemes.
The organization of this paper is as follows. Section 2, Section 3 and Section 4 discuss the related works, preliminaries and a review of the scheme proposed by Bhuarya et al., respectively. Section 5 presents the security weaknesses of the aforementioned scheme. In Section 6, we propose an improved AKA scheme for IoT using PUF to overcome the security weaknesses of previous schemes. Subsequently, we present the formal-, informal-security and simulation analyses in Section 7. Section 8 presents a comparative analysis of the related schemes. Finally, the conclusion is furnished in Section 9.
2. Related Works
In the last decade, several studies have been conducted to guarantee user and data privacy in IoT [4,5,6,7,8,9,10,11,13,14]. In 2014, Islam and Biwas [4] proposed a multi-factor authentication method using elliptic curve cryptosystems (ECCs) to provide secure communication for cloud computing. However, Sarvabhatla and Vorugunti [5] showed that the scheme proposed by Islam and Biwas did not prevent offline password guessing, replay, and user impersonation, and subsequently presented an enhanced ECC-based authentication scheme. However, their scheme is inefficient owing to its high computational cost. In 2015, Kalra and Sood [5] proposed an AKA scheme for cloud-enabled IoT using an ECC. However, in 2017, Kumari et al. [6] showed the security flaws of the Kalra and Sood Schemes and presented an AKA scheme using ECC to resolve these issues. Chaudhry et al. [7] and Chang et al. [8] simultaneously proposed an ECC-based remote user AKA scheme to provide secure mutual AKA. However, in 2019, Mo et al. [9] identified that the scheme proposed by Chaudhry et al. [7] did not resist smart-card loss attacks. Karuppiah et al. [10] proposed a remote AKA for cloud environments. However, Bhuarya et al. [11] pointed out that the aforementioned scheme did not prevent a password-guessing attack and did not achieve user anonymity and secure mutual authentication (SMA). Bhuarya et al. [11] cryptanalyzed the scheme proposed by Kumari et al. [6] and proposed an improved ECC-based AKA for cloud-based IoT. In 2022, Qureshi and Munir [13] also proposed a PUF-based robust authentication and key agreement scheme, and Wang et al. [14] proposed PUF-based authentication scheme with blockchain for wireless sensor network to prevent physical capture attacks. Although many schemes have been proposed, they do not prevent physical capture attacks or have a high communication cost while others simply do not consider them at all, which causes critical security issues.
3. Preliminaries
3.1. Threat Model
We adopted the Dolev–Yao (DY) threat model [19] to evaluate the security of the cryptographic protocols, including the assumptions proposed by Bhuarya et al. According to the adopted model, an adversary can control all messages transmitted in a public network. Additionally, an adversary can easily guess the identity or password but cannot guess them simultaneously in polynomial time. Moreover, an adversary cannot speculate on the secret parameters (secret key, nonce, random number, etc.) in polynomial time because of its large size. Finally, an adversary can obtain data stored in embedded devices that are not equipped with detailed tamper-proof techniques [20,21,22].
3.2. Physical Unclonable Function
A PUF [12] is a physically unclonable one-way function constructed from a semiconductor as an integrated circuit. PUF is based on challenge-response methods and allows for the identification and authentication of the user. In PUF, c is a challenge and is the input, and its unique response r is illustrated as . Although the same input is provided, PUF returns an inconsistent output. The PUF has following properties:
- (1)
- Unclonable: There is no function satisfying , and the probability of duplicating the same result in polynomial time is negligible.
- (2)
- Computable and unpredictable: is easily computed; however, it is infeasible to correctly guess r of the corresponding to c in polynomial time.
3.3. Fuzzy Extractor
The PUF response is not perfect because of its susceptibility to surrounding conditions and noise. Therefore, it cannot be utilized in cryptographic protocols as a secret parameter. To correct the noise or errors, we utilize a fuzzy extractor [23,24] that can recover a uniform PUF response r. A fuzzy extractor consists of the two following functions.
- (1)
- Generation function : , where c, a, and h are the input value, return value, and auxiliary string, respectively.
- (2)
- Reproduction function : , where c and h are the noisy input value and auxiliary string, respectively. can recover the correct a from c and helper string h.
4. Review of Bhuarya et al. Scheme
This section reviews the scheme proposed by Bhuarya et al. [11] to demonstrate their security limitations. The scheme consists of three phases: initial, registration, and login and authentication. The notations used in this paper are presented in Table 1.
Table 1.
Notations.
4.1. System Setup Phase
This phase is executed by the CS to set up the initial parameters for the system. The CS selects a large prime number p, elliptic curve equation over the finite field , and elements , where satisfy the condition . G and O are the base points of the elliptic curve and the point at infinity, respectively, where . The CS then generates a secret key and broadcasts the initial public parameters.
4.2. Registration Phase
In this phase, embedded devices register themselves with the CS through a secure network to use the CS services. The detailed steps of this phase are as follows.
- (1)
- chooses the identity and password . It then computes and sends it to the CS via a secure channel.
- (2)
- After receiving , the CS selects a random number and computes a pseudo identity for . Afterwards, the CS computes the cookie , , , , and . The CS computes , , and expiration time , and then stores it with and sends to through a secure channel. If is expired, is updated to and computes a new cookie .
- (3)
- Finally, stores , , with in a memory.
4.3. Login and Authentication Phase
In this phase, the CS and authenticate each other, which is executed via a public channel. The detailed steps of this phase are as follows.
- (1)
- A user inputs their identity and password , and then computes and checks if . If it is valid, chooses a random number , a current timestamp , and computes , , , and . Then, sends the login request to CS.
- (2)
- Upon receiving the login request from , the CS checks the timestamp validity, computes , and finds in the database.
- (3)
- If it exists, the CS calculates , , , , and , and then verifies that is equal to Y. If it is correct, the CS chooses a random number and a current timestamp and calculates , , and . Subsequently, the CS sends the response messages to .
- (4)
- After receiving from CS, calculates , and , and then verifies that and the timestamp is valid. If this is correct, generates the session key and , and then sends the messages to CS.
- (5)
- The CS checks the validity of the timestamp and generates the session key and . Then, the CS verifies that is equal to . If it is, the CS and successfully authenticate each other.
5. Security Weaknesses of Bhuarya et al.’s Scheme
In this section, we show that the scheme proposed by Bhuarya et al. does not prevent various potential attacks, such as impersonation and man-in-the-middle. Moreover, their scheme has an incorrect authentication mechanism and does not guarantee SMA, which is an essential requirement of an AKA protocol. This analysis was performed under the DY threat model described in Section 3.1.
5.1. Impersonation Attack
Owing to the fact that the scheme does not provide detailed tamper-proof techniques, we suppose that an adversary obtains the embedded device or captures it physically. Subsequently, can access the data stored in and perform impersonation attacks using the obtained data as follows:
- (1)
- chooses a random number and a current timestamp , and computes , , , and . Then, sends the login request to CS.
- (2)
- On receiving the login request from , the CS checks the timestamp validity, computes , and finds in the database.
- (3)
- If it exists, the CS computes , , , , and . The CS subsequently verifies that is equal to Y. If it correct, the CS selects a random number and a current timestamp , and computes , , . Afterwards, the CS sends the response messages to .
- (4)
- After receiving from CS, computes , , and , and then verifies that and timestamp is valid. If it is correct, computes the session key and , and then sends the messages to CS.
- (5)
- The CS checks the validity of the timestamp and computes the session key and . Then, the CS verifies that is equal to . If it is, the CS and successfully authenticate each other.
can successfully generate a valid login request and response messages , showing that the aforementioned scheme does not resist impersonation attacks.
5.2. Man-in-the-Middle Attack
An adversary can perform a man-in-the-middle attack as follows:
- (1)
- first intercepts the login request of , and then chooses a random number and a current timestamp . computes , , , , and sends the login request to CS.
- (2)
- chooses a random number and computes , , and , where is obtained by the threat model.
- (3)
- intercepts the response messages of the CS, and then computes and . Finally, sends and to the CS and , respectively.
- (4)
- After receiving and , the CS and generates the session key using received messages.
can successfully establish the session key using and , which shows that the aforementioned scheme does not prevent man-in-the-middle attacks.
5.3. Correctness of Authentication Mechanism
In the login and authentication phase of the scheme, the CS computes and sends it to . Subsequently, computes and verifies that to authenticate the CS. However, cannot authenticate the CS because S is not equal to as follows:
5.4. Secure Mutual Authentication
In Section 5.1 and Section 5.2, we proved that the scheme proposed by Bhuarya et al. does not resist impersonation and man-in-the-middle attacks. Moreover, we proved that their scheme contains an incorrect authentication mechanism, which causes the authentication process to be aborted. Therefore, the scheme does not ensure SMA.
6. Proposed Scheme
This section presents an improved AKA scheme for IoT using PUF, which comprises three phases: system setup, registration, and login and authentication. In our scheme, embedded devices are tamper-proof devices that use a PUF to protect the data stored in memory. The embedded devices register their identities with the CS, authenticate them, and establish the session key to each other. After completing the AKA phase, can use the various services offered by the CS.
6.1. System Setup Phase
The CS sets up the initial parameters related to the elliptic curve, which is identical to the Bhuarya et al. scheme. The CS then generates a secret key and broadcasts the initial public parameters.
6.2. Embedded Device Registration Phase
This phase is shown in Figure 1, and the detailed steps are as follows:
Figure 1.
Registration Phase for Our Scheme.
- (1)
- User selects identity , password , challenge , and random number for , and then computes , , and . calculates and using the PUF and fuzzy extractor. Afterwards, computes and sends to the CS via a secure channel.
- (2)
- On receiving the registration request from , the CS chooses a random number for , and then computes and . The CS stores with in a secure database and sends to through a secure channel.
- (3)
- After receiving from the CS, computes and , and stores in memory.
6.3. Authentication and Key Agreement Phase
This phase is shown in Figure 2, and the detailed steps are as follows:
Figure 2.
Login and Authentication Phase for Our Scheme.
- (1)
- User inputs the identity with password to , and then computes , , , , , , , and . checks whether . If it is correct, chooses a random number and a current timestamp ; otherwise, it aborts the connection. computes , , and , and then sends to the CS.
- (2)
- On receiving the login request from , the CS checks the timestamp validity and finds using from a secure database. The CS computes , and , and then verifies that is equal to .
- (3)
- If it is equal, the CS generates computes a random number and a current timestamp ; otherwise, aborts the connection. The CS calculates , , the session key , and . After that, the CS sends the response messages to .
- (4)
- After receiving from the CS, checks timestamp validity and computes , , the session key , and . Then, checks whether . If it is verified, generates a current timestamp and computes . sends the verification messages to the CS.
- (5)
- On receiving to , the CS computes and checks its validity. If it is verified, the CS and successfully authenticate each other.
7. Security Analysis
In this section, we prove that iAKA-CIoT ensures the session key security (SKS) using the real-or-random (RoR) model [25]. We also perform an informal analysis and simulation analysis using the AVISPA verification tool [18] to demonstrate that our scheme is secure against various potential attacks.
7.1. Formal Security Analysis Using ROR Model
We prove that our scheme achieves SKS using an ROR model-based mathematical formal proof [26,27,28]. We first discuss the fundamental concept and queries of the ROR model before conducting the formal analysis.
- Participants: Let and be the instance and of the ED and CS, respectively.
- Accepted state: After completing the message exchanging process, the oracle transfers a this state. Let the current session identifier be of should all the messages be arranged in order.
- Partnering: When and have the same and the accepted state, and each oracle completes the AKA, partners ( and ) are defined.
- Freshness: To carry out the formal proof, and as instances are deemed fresh if the session key between the ED and CS is presently not revealed to adversary A.
- Attacker: Under our enhanced threat model Section 3.1, A can completely control the public network and send the ROR queries shown in Table 2 to destroy the SKS.
Table 2. Queries with their descriptions. - Semantic Security: A tries to find a correct session key from a random number utilizing the ROR queries. If A correctly guesses a bit c, A wins this game and breaks the semantic security of the scheme. Let be the advantage in breaking the session key of scheme , where is the event of the winning game by A.
- Random oracle: All participant entities can use a random oracle as a collision resistant one-way hash function .
Now, we prove that our scheme ensures SKS using the following Definitions 1 and 2 and Theorem 1.
Definition 1.
Elliptic curve discrete logarithm problem (ECDLP): Given P and Q, it is computationally intractable to find integer a such that , where .
Definition 2.
Elliptic curve decision Diffie–Hellman problem (ECDDHP): Given , and , it is computationally difficult to compute , where .
Theorem 1.
Let an adversary run in polynomial time t as A, and let the advantage of A in breaking the SKS be . Then,
where , , and is the number of queries, a collision-resistant hash function , and an advantage in breaking ECDLP, respectively.
The formal proofs consisting of four games using the ROR model are as follows:
- Game : A first tosses the coin c and obtains its result at the beginning of this game. Its winning advantage is:where is the event of A winning the game.
- Game : Under this game, Attacker A performs an eavesdropping attack using the query. A first intercepts the transmitted messages , , and to break the SKS. Then, A executes the query to guess whether the output of the query is equal to or any arbitrary number. However, the winning probability of does not increase because A does not compute the session key without breaking the ECDLP and ECDDHP. Thus, we obtain:
- Game : Attacker A performs an active attack using and queries. A attempts to guess the correct message digest collision to mislead a participant entity using several queries. However, in our scheme, all transmitted messages are secured because A does not break the oracle in polynomial time. Moreover, A cannot compute the correct messages without the pseudo-identity , secret value , and tamper-proof value . Thus, according to the birthday paradox [29],
- Game : Attacker A performs a final attack and can obtain stored in the memory of using . However, A does not compute the valid login request messages without knowing , where and . Since A does not know , , and , A cannot correctly guess using . Moreover, is only generated by the secure PUF function with a fuzzy extractor, which is defined in Section 3.2, and A does not distinguish between the PUF values and those of the noise without help of fuzzy extractor because the guessing probability of fuzzy extractor values and is approximately and , respectively. Therefore, from the PUF simulation and Zipf’s law on passwords [30],
After simulating all the games (, A attempts to guess the correct c using the query. Therefore,
Finally, we acquire the final goal by multiplying both sides of (8) by two.
7.2. Informal Security Analysis
This section demonstrates that our scheme is secure against various potential attacks, such as impersonation, man-in-the-middle, replay, physical capture, and offline password guessing. In addition, we demonstrate that it guarantees SMA and anonymity.
7.2.1. Impersonation Attack
Under our threat model, an adversary can acquire the exchanged messages in a public network and extract the stored data from the memory of . However, cannot attempt to impersonate a legitimate because does not successfully generate the login request and verification messages without knowing , , and . Therefore, iAKA-CIoT is secure against impersonation attacks.
7.2.2. Man-in-the-Middle Attack and Replay Attack
When tries to perform a man-in-the-middle attack, should obtain and compute the response messages and . However, cannot obtain and without obtaining . Moreover, all response messages include a timestamp and are masked by a collision-resistant hash function, which makes it difficult to find original messages in polynomial time. Therefore, iAKA-CIoT resists man-in-the-middle and replay attacks.
7.2.3. Physical Capture Attack
After obtaining the data stored in the memory of ’ using a physical capture attack, the data do not help compute the session key because the PUF response is only generated by and cannot retrieve from . Therefore, our scheme protects against physical-capture attacks.
7.2.4. Offline Password Guessing Attack
We assume that attempts to guess the password of the user by using intercepted messages and extracting data. must know the real identity , random number , pseudo identity and secure parameter . However, does not know these values because it is masked by a collision-resistant hash function, and cannot simultaneously guess two or three parameters in polynomial time. Therefore, iAKA-CIoT is secure against offline password-guessing attacks.
7.2.5. Secure Mutual Authentication and Anonymity
In the AKA phase of our scheme, the CS and verify the login request and response messages by using and . According to previous analyses (Section 7.2.1, Section 7.2.2 and Section 7.2.3), does not compute verification messages and without obtaining . Moreover, in our scheme, the user utilizes the pseudo identity for the AKA phase, and cannot obtain the real identity of the user. Therefore, our scheme achieves SMA and anonymity.
7.2.6. Denial-of-Service Attack
After receiving exchanged messages between CS and , they should perform verification procedures to prove validity of these messages {}. If it is not valid, the AKA procedure is immediately aborted. It can mitigate denial of service (DoS)/distributed denial of service (DDoS) attacks because {} has freshness which includes timestamp and random number, and can be generated by a legitimate entities.
7.3. Simulation Analysis Using AVISPA Tool
In this section, we discuss the simulation of our scheme by using the AVISPA simulation tool to prove its security [18,31]. AVISPA is a well-known formal simulation tool for evaluating the security of protocols, whereby it verifies that a protocol resists man-in-the-middle and replay attacks. First, we define the security properties of our scheme by using a high-level protocol specification language (HLPSL) [32]. The defined HLPSL code was transformed into an intermediate format using the HLPSL2IF translator. This simulation was executed under the four back-ends model [33]; “on-the-fly model checker” (OFMC); “tree automata based on a protocol analyzer” (TA4SP); “SAT-based model checker” (SATMC), and “constraint logic-based attack searcher” (CL-AtSE). The procedure of this simulation is shown in Figure 3 and the concept of HLPSL is presented in [31,32].
Figure 3.
The Procedures of AVISPA Simulation.
7.3.1. HLPSL Specifications
We simulated the defined HLPSL by considering the and CS AKA phase. There are two basic roles (CS, ), and their HLPSL descriptions are presented in Figure 4 and Figure 5. A session with the environment is defined in Figure 6.
Figure 4.
HLPSL Description: CS Role.
Figure 5.
HLPSL Description: role.
Figure 6.
HLPSL Description: Session and Environment.
7.3.2. Simulation Results
Figure 7 shows the results of the AVISPA simulation, which presents the simulation summary “SAFE”. In the CL-AtSe results, the translation time was 0.01 s. For the OFMC results, the search depth was four when 16 nodes were explored in 0.02 s. Therefore, our scheme prevents man-in-the-middle and replay attacks.
Figure 7.
Simulation Result of AVISP Simulation (Summary: SAFE). (a) Result of CL-AtSe. (b) Result of OFMC.
8. Comparative Analysis
This section presents a comparative analysis of our scheme on the security property, communication, and computation cost with other related schemes [6,10,11,16,17].
8.1. Security Property
We compared the security properties of our scheme with those of the contemporary schemes. Table 3 shows that the previous schemes cannot resist security attacks, achieve anonymity, or SMA. In contrast, we demonstrate that iAKA-CIoT can prevent potential security attacks and guarantee essential security requirements. Therefore, our scheme is more secure than the aforementioned schemes [6,10,11,13,14,16,17].
Table 3.
A Comparative Summary: Security Properties.
We demonstrated that Bhuarya et al. [11] is insecure against physical capture attacks in Section 5. We also proved that other related schemes [6,10,16] does not prevent physical capture attacks to highlight our contributions. The detailed processes of AKA schemes refer to [6,10,16,17].
In [6], an adversary can extract the data {} stored in the embedded device , and then selects a random number and computes , . Finally can successfully generate the login request messages without knowing any other information.
In [10], can obtain the parameters and from the user’s smart card and open channel. Then, tries to obtain the by executing offline password guessing attacks [34]. chooses {, and computes , , ) and . If is equal to , successfully guesses the correct and can correctly generate valid login request.
In [16], we assumed that is a dishonest registered participant in the system. Then, can extract the data from smart card and can impersonate a legitimate user using it. In their scheme, can establish the session key of any legitimate user by betraying a trusted server [7].
Therefore, the aforementioned schemes are insecure against physical capture attacks because they stored secret data as plaintext, which causes critical security issues.
8.2. Computation, Communication and Storage Costs
In this analysis, we consider the AKA phase for protocols. Table 4, Table 5 and Table 6 compare the computation, communication and storage costs between our scheme and other related schemes, which is shown in Figure 8, Figure 9 and Figure 10, respectively.
Table 4.
A Comparative Analysis: Computational Cost.
Table 5.
A Comparative Analysis: Communication Cost.
Table 6.
A Comparative Analysis: Storage Cost.
Figure 8.
A Comparative Analysis: Computational Cost (Figure).
Figure 9.
A Comparative Analysis: Communication Cost (Figure).
Figure 10.
A Comparative Analysis: Storage Cost (Figure).
The computation cost analysis was performed using Raspberry PI 4B with Linux Ubuntu 18.04.4 LTS with 64-bits, 8 GB, and MIRACL library. We utilized the average values for each cryptographic primitive, which was run 100 times to measure its execution cost. To evaluate the computational cost of iAKA-CIoT compared with other schemes, we considered four cryptographic primitives, and their execution costs are presented in Table 7.
Table 7.
Execution cost (milliseconds).
Our scheme requires the total cost ms, whereas the total cost for other schemes are as follows: that in Kumari et al. [6] required ms; that in Karuppiah et al. [10] required ms; that in Huang et al. [16] required ms; that in Jiang et al. [17] required ms; that in Bhuarya et al. [11] required ms; that in Qureshi and Munir [13] required ms; that in Wang et al. [14] required ms.
For the comparison of communication costs, we defined the message length of the parameters. The one-way hash function, identity, timestamp, and random number are 160 bits. The elliptic curve point and modular exponentiation are 320 and 1024 bits, respectively. In our scheme, the exchanged messages , , and needs bits, bits, and bits, respectively. Thus, the total communication cost for our scheme was . Kumari et al. [6], Karuppiah et al. [10], Huang et al. [16], Jiang et al. [17], Bhuarya et al. [11], Qureshi and Munir [13] and Wang et al. [14] required 1760, 2848, 1600, 1984, 1760, 2400, and 3200, respectively.
The iAKA-CIoT requires a storage cost of 960 bits, whereas the storage cost for other schemes are as follows: that in Kumari et al. [6] required 480 bits; that in Karuppiah et al. [10] required 3712 bits; that in Huang et al. [16] required 320 bits; that in Jiang et al. [17] required 640 bits; that in Bhuarya et al. [11] required 640 bits; that in Qureshi and Munir [13] required 800 bits; and that in Wang et al. [14] required 960 bits.
Section 8.1 shows that the abovementioned schemes [6,10,11,13,14,16,17] are insecure against various attacks such as password guessing, impersonation, replay, and physical capture attacks. Moreover, their schemes do not provide anonymity, a formal proof analysis, or SMA. Although some schemes [13,14] can prevent physical capture attacks, their scheme has security weaknesses [15] or high communication costs. Therefore, our scheme is secure and superior for practical IoT environments.
9. Conclusions
This paper demonstrated that the Bhuarya et al. scheme had an incorrect authentication mechanism, did not resist various attacks, such as impersonation, man-in-the-middle, and physical capture attacks. We also demonstrated that it did not achieve SMA and SKS. We proposed an improved authentication and key agreement scheme for cloud-enabled IoT using PUF to resolve these security flaws. We demonstrated that iAKA-CIoT is secure against impersonation, man-in-the-middle, replay, offline-password guessing, and physical capture attacks, and achieves SMA and anonymity. Formal security proof confirmed that our scheme achieved SKS between the CS and ED using the ROR model. Moreover, we performed a formal simulation analysis using the AVISPA tool and compared it with other related schemes using the Raspberry PI 4B with MIRACL library. Our scheme also provides superior security properties compared to the aforementioned schemes. Therefore, iAKA-CIoT is suitable for practical cloud-enabled IoT environments because it is more secure and superior than the other related schemes.
Author Contributions
Conceptualization, K.P.; Formal analysis, K.P.; Methodology, K.P.; Project administration, Y.P.; Supervision, Y.P.; Validation, K.P.; Writing—original draft, K.P.; Writing—review & editing, Y.P. All authors have read and agreed to the published version of the manuscript.
Funding
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2020R1I1A3058605).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Statista: Internet of Things (IoT) and Non-IoT Active Device Connections Worldwide from 2010 to 2025. Available online: https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/ (accessed on 6 May 2022).
- Statista: Forecast End-User Spending on IoT Solutions Worldwide from 2017 to 2025. Available online: https://www.statista.com/statistics/976313/global-iot-market-size/ (accessed on 26 May 2022).
- Dizdarević, J.; Carpio, F.; Jukan, A.; Masip-Bruin, X. A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Comput. Surv. (CSUR) 2019, 51, 1–29. [Google Scholar] [CrossRef]
- Islam, S.H.; Biswas, G. Dynamic ID-based remote user mutual authentication scheme with smartcard using elliptic curve cryptography. J. Electron. (China) 2014, 31, 473–488. [Google Scholar] [CrossRef]
- Sarvabhatla, M.; Vorugunti, C.S. A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography. In Proceedings of the 2015 Seventh International Workshop on Signal Design and its Applications in Communications (IWSDA), Bengaluru, India, 14–18 September 2015. [Google Scholar]
- Kumari, S.; Karuppiah, M.; Das, A.K.; Li, X.; Wu, F.; Kumar, N. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 2017, 74, 6428–6453. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Naqvi, H.; Mahmood, K.; Ahmad, H.F.; Khan, M.K. An improved remote user authentication scheme using elliptic curve cryptography. Wirel. Pers. Commun. 2017, 96, 5355–5373. [Google Scholar] [CrossRef]
- Chang, C.-C.; Wu, H.-L.; Sun, C.-Y. Notes on “Secure authentication scheme for IoT and cloud servers”. Pervasive Mob. Comput. 2017, 38, 275–278. [Google Scholar] [CrossRef]
- Mo, J.; Hu, Z.; Chen, H.; Shen, W. An efficient and provably secure anonymous user authentication and key Agreement for mobile cloud computing. Wirel. Commun. Mob. Comput. 2019, 2019, 4520685. [Google Scholar] [CrossRef]
- Karuppiah, M.; Das, A.K.; Li, X.; Kumari, S.; Wu, F.; Chaudhry, S.A.; Niranchana, R. Secure a remote user mutual authentication scheme with key agreements for the cloud environment. Mob. Netw. Appl. 2019, 24, 1046–1062. [Google Scholar] [CrossRef]
- Bhuarya, P.; Chandrakar, P.; Ail, R.; Sharaff, A. An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography. Int. J. Commun. Syst. 2019, 34, e4834. [Google Scholar] [CrossRef]
- Wallrabenstein, J.R. Practical and secure IoT device authentication using physical unclonable functions. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 22–24 August 2016. [Google Scholar]
- Qureshi, M.A.; Munir, A. PUF-RAKE: A PUF-based robust and lightweight authentication and key establishment protocol. IEEE Trans. Dependable Secur. Comput. 2022, 4, 2457–2475. [Google Scholar] [CrossRef]
- Wang, W.; Chen, Q.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J. 2022, 9, 8883–8891. [Google Scholar] [CrossRef]
- Yu, S.; Park, Y. A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions. IEEE Internet Things J. 2022. to be published. [Google Scholar] [CrossRef]
- Huang, B.; Khan, M.K.; Wu, L.; Muhaya, F.T.B.; He, D. An efficient remote user authentication with key agreement scheme using elliptic curve cryptography. Wirel. Pers. Commun. 2015, 85, 225–240. [Google Scholar] [CrossRef]
- Jiang, Q.; Ma, J.; Li, G.; Li, X. Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 2015, 28, 383–393. [Google Scholar] [CrossRef]
- AVISPA. Automated Validation of Internet Security Protocols and Applications. Available online: http://people.irisa.fr/Thomas.Genet/span/ (accessed on 8 April 2022).
- Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552. [Google Scholar] [CrossRef] [Green Version]
- Eisenbarth, T.; Kasper, T.; Moradi, A.; Paar, C.; Salmasizadeh, M.; Shalmani, M.T.M. On the power of power analysis in the real world: A complete break of the KEELOQ code-hopping scheme. In Advances in Cryptology—CRYPTO; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
- Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Advances in Cryptology—CRYPTO; Springer: Berlin/Heidelberg, Germany, 1999. [Google Scholar]
- Dodis, Y.; Ostrovsky, R.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 2008, 38, 97–139. [Google Scholar] [CrossRef] [Green Version]
- Delvaux, J.; Gu, D.; Schellekens, D.; Verbauwhede, I. Helper data algorithms for PUF-based key generation: Overview and analysis. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2015, 34, 889–902. [Google Scholar] [CrossRef] [Green Version]
- Abdalla, M.; Fouque, P.; Pointcheval, D. Password-based authenticated key exchange in a three-party setting. In Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC’05), Les Diablerets, Switzerland, 23–26 January 2005. [Google Scholar]
- Yu, S.; Lee, J.; Park, K.; Das, A.K.; Park, Y. IoV-SMAP: Secure and efficient message authentication protocol for IoV in a smart city environment. IEEE Access 2020, 8, 167875–167886. [Google Scholar] [CrossRef]
- Park, K.; Lee, J.; Das, A.K.; Park, Y. BPPS:Blockchain-enabled privacy-preserving scheme for demand response management in smart grid environments. IEEE Trans. Dependable Secur. Comput. 2022. Early Acess. [Google Scholar] [CrossRef]
- Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of blockchain-based lightweight V2I handover authentication protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
- Boyko, V.; Mackenzie, P.; Patel, S. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques Advances in Cryptology (EUROCRYPT), Bruges, Belgium, 14–18 May 2000. [Google Scholar]
- Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s Law in Passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
- Park, K.; Noh, S.; Lee, H.; Das, A.K.; Kim, M.; Park, Y.; Wazid, M. LAKS-NVT: Provably secure and lightweight authentication and key agreement scheme without verification table in medical Internet of Things. IEEE Access 2020, 8, 119387–119404. [Google Scholar] [CrossRef]
- Von Oheimb, D. The high-level protocol specification language, HLPSL developed in the EU project avispa. In Proceedings of the APPSEM 2005 Workshop, Tallinn, Finland, 13–15 September 2005. [Google Scholar]
- Vigano, L. Automated Security Protocol Analysis with the AVISPA Tool. Electron. Notes Theor. Comput. Sci. 2006, 155, 61–68. [Google Scholar] [CrossRef] [Green Version]
- Xu, M.; Wang, D.; Wang, Q.; Jia, Q. Understanding security failures of anonymous authentication schemes for cloud environments. J. Syst. Archit. 2021, 118, 102206–102215. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).









