Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3607947.3608064acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3Conference Proceedingsconference-collections
research-article

Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment

Published: 28 September 2023 Publication History

Abstract

Across the world, intruders are constantly on the lookout to exploit security weaknesses which brings the risk of jeopardy to the data of companies, governments, monitoring, and healthcare organizations. With this arises the demand for the Internet of Things (IoT) to authenticate users using unique signatures generated by each device. In this paper, we investigate the RCBE-AS technique for wireless sensor networks (WSN) in an IoT scenario, as described by Singh et al. The model is discovered to be vulnerable to a wide range of attacks, including user tracing, smart card (SC) loss attacks, denial-of-service attacks, attacks on sensor nodes that are not anonymous, hostile and ineffective password changes, and a problem with perfect forward secrecy.

References

[1]
Bakkiam David Deebak and AL-Turjman Fadi. 2021. Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. Future generation computer systems 116 (2021), 406–425.
[2]
Kai Fan, Qi Luo, Kuan Zhang, and Yintang Yang. 2020. Cloud-based lightweight secure RFID mutual authentication protocol in IoT. Information Sciences 527 (2020), 329–340.
[3]
Aarti Goel, Deepak Kumar Sharma, and Koyel Datta Gupta. 2022. LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks. Expert Systems 39, 5 (2022), e12788.
[4]
Fatma Hendaoui, Hamdi Eltaief, and Habib Youssef. 2021. UAP: A unified authentication platform for IoT environment. Computer Networks 188 (2021), 107811.
[5]
Sarah Izza, Mustapha Benssalah, and Karim Drouiche. 2021. An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. Journal of Information Security and Applications 58 (2021), 102705.
[6]
Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Annual international cryptology conference. Springer, 388–397.
[7]
Adesh Kumari, Srinivas Jangirala, M Yahya Abbasi, Vinod Kumar, and Mansaf Alam. 2020. ESEAP: ECC based secure and efficient mutual authentication protocol using smart card. Journal of Information Security and Applications 51 (2020), 102443.
[8]
Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, and Neeraj Kumar. 2018. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing 74, 12 (2018), 6428–6453.
[9]
Jianhua Li, Jiong Jin, Lingjuan Lyu, Dong Yuan, Yingying Yang, Longxiang Gao, and Chao Shen. 2021. A fast and scalable authentication scheme in IoT for smart living. Future Generation Computer Systems 117 (2021), 125–137.
[10]
Thomas S Messerges, Ezzat A Dabbish, and Robert H Sloan. 2002. Examining smart-card security under the threat of power analysis attacks. IEEE transactions on computers 51, 5 (2002), 541–552.
[11]
Mahdi Nikooghadam, Haleh Amintoosi, and Saru Kumari. 2020. A provably secure ECC-based roaming authentication scheme for global mobility networks. Journal of Information Security and Applications 54 (2020), 102588.
[12]
Samad Rostampour, Masoumeh Safkhani, Ygal Bendavid, and Nasour Bagheri. 2020. ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive and Mobile Computing 67 (2020), 101194.
[13]
Manasha Saqib, Bhat Jasra, and Ayaz Hassan Moon. 2022. A lightweight three factor authentication framework for IoT based critical applications. Journal of King Saud University-Computer and Information Sciences 34, 9 (2022), 6925–6937.
[14]
Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand, and Pradeep Kumar Singh. 2021. RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks. Personal and Ubiquitous Computing (2021), 1–22.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
IC3-2023: Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing
August 2023
783 pages
ISBN:9798400700224
DOI:10.1145/3607947
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 September 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Attacks.
  2. Authentication
  3. Cryptography
  4. IoT
  5. Security
  6. WSN

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IC3 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 28
    Total Downloads
  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media