A Secure Authentication Protocol for IoT-WLAN Using EAP Framework

被引:0
|
作者
Yadav, Awaneesh Kumar [1 ]
Misra, Manoj [1 ]
Pandey, Pradumn Kumar [1 ]
Ranaweera, Pasika [2 ]
Liyanage, Madhusanka [2 ]
Kumar, Neeraj [3 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee 247667, Uttarakhand, India
[2] Univ Collage Dublin, Sch Comp Sci, Dublin D02 PN40, Ireland
[3] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, India
基金
爱尔兰科学基金会;
关键词
Authentication; Protocols; Wireless LAN; Security; Protection; Internet of Things; Servers; extensible authentication protocol (EAP); formal verification; network security; wireless local area network (WLAN); EFFICIENT; SCHEME;
D O I
10.1109/TDSC.2024.3388467
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The plethora of Internet of Things (IoT) devices and their diversified requirements have opted to design security mechanisms that cover all major security requirements. Wireless Local Area Networks (WLANs) is the most common network domains where IoT devices are launched, particularly because of its easy availability. Security, in other words authentication however, remains to be a major constriction for IoT-WLAN deployments. Though there are IoT based authentication protocols prevailing, such protocols are either prone to threats such as perfect forward secrecy violations, insider with database access attack, traceability attack, stolen device attack, ephemeral secret leakage, or they consume excessive computational and communication resources that result in an unprecedented burden for the IoT system. This article presents an Extensible Authentication Protocol (EAP) based mechanism for IoT devices deployed in a WLAN that addresses the above security issues and achieves cost-effectiveness. Validation follows an informal and formal approaches (using GNY and BAN logic, and Scyther verification tool) for the proposed protocol, demonstrating its robustness. Our performance analysis shows that the proposed protocol is lightweight and more secure in contrast to the state-of-the-art solutions. In addition, performance of the proposed protocol subjected to unknown attacks is investigated, which deduces that the proposed protocol has less overhead under unknown attacks than its competitors. A prototype of the protocol has been developed to demonstrate its feasibility and accuracy.
引用
收藏
页码:49 / 65
页数:17
相关论文
共 50 条
  • [41] Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
    Benrebbouh, Chahrazed
    Mansouri, Houssem
    Cherbal, Sarra
    Pathan, Al-Sakib Khan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 68 - 88
  • [42] A Secure IoT Firmware Update Framework Based on MQTT Protocol
    Lo, Nai-Wei
    Hsu, Sheng-Hsiang
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2019, PT I, 2020, 1050 : 187 - 198
  • [43] An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
    Izza, Sarah
    Benssalah, Mustapha
    Drouiche, Karim
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [44] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [45] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [46] A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices
    Mahalat, Mahabub Hasan
    Saha, Shreya
    Mondal, Anindan
    Sen, Bibhash
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 183 - 187
  • [47] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [48] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [49] Secured Multi-Tier Mutual Authentication Protocol for Secure IoT System
    Vairagade, Rupali S.
    Brahmananda, S. H.
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 195 - 200
  • [50] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    R. Vinoth
    Lazarus Jegatha Deborah
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1431 - 1443