Ndibanje Bruce, Lee Hoon-Jae, Lee Sang-Gon
Department of Ubiquitous IT Graduate School of Design & IT, Dongseo University, Sasang-Gu, Busan 617-716, Korea.
Division of Computer & Engineering, Dongseo University, Sasang-Gu, Busan 617-716, Korea.
Sensors (Basel). 2014 Aug 13;14(8):14786-805. doi: 10.3390/s140814786.
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
物联网是一个普遍存在的概念,其中物理对象通过互联网连接,并被赋予唯一标识符,以便它们能够向其他设备进行自我识别,并具备持续生成数据并通过网络传输数据的能力。因此,随着物联网网络在交换数据和互连传感器节点方面增长非常迅速,网络、数据和传感器设备的安全性成为物联网网络中至关重要的问题。本文分析了Jing等人提出的用于物联网的认证和访问控制方法(《物联网中的认证和访问控制》。发表于《2012年第32届分布式计算系统国际会议研讨会论文集》,中国澳门,2012年6月18 - 21日,第588 - 592页)。根据我们的分析,Jing等人的协议在消息交换方面成本高昂,并且对于这样一个协议,其安全评估不够强大。因此,我们对该协议提出改进,以填补发现的弱点漏洞。协议增强为用户提供了许多服务,如用户匿名性、相互认证和安全会话密钥建立。最后,性能和安全分析表明,改进后的协议在抵御常见攻击方面具有许多优势,并以低通信成本实现了更好的效率。