A Secure Authentication Protocol for IoT-WLAN Using EAP Framework

被引:0
|
作者
Yadav, Awaneesh Kumar [1 ]
Misra, Manoj [1 ]
Pandey, Pradumn Kumar [1 ]
Ranaweera, Pasika [2 ]
Liyanage, Madhusanka [2 ]
Kumar, Neeraj [3 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
[2] Univ Collage Dublin, Sch Comp Sci, Dublin D02 PN40, Ireland
[3] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, India
基金
爱尔兰科学基金会;
关键词
Authentication; Protocols; Wireless LAN; Security; Protection; Internet of Things; Servers; extensible authentication protocol (EAP); formal verification; network security; wireless local area network (WLAN); EFFICIENT; SCHEME;
D O I
10.1109/TDSC.2024.3388467
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The plethora of Internet of Things (IoT) devices and their diversified requirements have opted to design security mechanisms that cover all major security requirements. Wireless Local Area Networks (WLANs) is the most common network domains where IoT devices are launched, particularly because of its easy availability. Security, in other words authentication however, remains to be a major constriction for IoT-WLAN deployments. Though there are IoT based authentication protocols prevailing, such protocols are either prone to threats such as perfect forward secrecy violations, insider with database access attack, traceability attack, stolen device attack, ephemeral secret leakage, or they consume excessive computational and communication resources that result in an unprecedented burden for the IoT system. This article presents an Extensible Authentication Protocol (EAP) based mechanism for IoT devices deployed in a WLAN that addresses the above security issues and achieves cost-effectiveness. Validation follows an informal and formal approaches (using GNY and BAN logic, and Scyther verification tool) for the proposed protocol, demonstrating its robustness. Our performance analysis shows that the proposed protocol is lightweight and more secure in contrast to the state-of-the-art solutions. In addition, performance of the proposed protocol subjected to unknown attacks is investigated, which deduces that the proposed protocol has less overhead under unknown attacks than its competitors. A prototype of the protocol has been developed to demonstrate its feasibility and accuracy.
引用
收藏
页码:49 / 65
页数:17
相关论文
共 50 条
  • [1] An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices
    Yadav, Awaneesh Kumar
    Misra, Manoj
    Pandey, Pradumn Kumar
    Liyanage, Madhusanka
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1343 - 1355
  • [2] Secure 3GPP-WLAN Authentication Protocol Based on EAP-AKA
    Patkar, Shruti S.
    Ambawade, Dayanand D.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1011 - 1016
  • [3] An Authentication Protocol based on EAP-PAX for WLAN
    Wang Bin
    He Lei
    Wu Zhi-hui
    2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 164 - +
  • [4] An Authentication Protocol Based on EAP-EKE for WLAN
    Wang Bin
    He Lei
    Wu Zhi-hui
    2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 10 - 13
  • [5] IoT-WLAN Proximity Network for Potentiostats
    Gonzalez, Pedro
    Lloret, Jaime
    Tomas, Jesus
    Rodriguez, Oscar
    Hurtado, Mikel
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 94 - 99
  • [6] Provable secure authentication protocol for WLAN mesh
    Cao, Chun-Jie
    Yang, Chao
    Guo, Yuan-Bo
    Ma, Jian-Feng
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2007, 37 (06): : 1354 - 1358
  • [7] WLAN Authentication System Based on the Improved EAP-TLS Protocol
    Huang, Weili
    Li, Renle
    PROCEEDINGS OF THE 2009 SECOND PACIFIC-ASIA CONFERENCE ON WEB MINING AND WEB-BASED APPLICATION, 2009, : 112 - 115
  • [8] A secure mutual authentication protocol for IoT environment
    Panda P.K.
    Chattopadhyay S.
    Journal of Reliable Intelligent Environments, 2020, 6 (2) : 79 - 94
  • [9] Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes
    Ali S.
    Anwer F.
    International Journal of Information Technology, 2024, 16 (4) : 2053 - 2067
  • [10] Secure protocol for fast authentication in EAP-Based wireless networks
    Marin, Rafa
    Zapata, Santiago
    Gomez, Antonio F.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1038 - 1051