Abstract
Internet of Things (IoT) is a muti-layer technology that allows to devices (sensors and actuators) to connect and exchange data. In the last decade, IoT has known a great growth rapidly. As result of this exponential development, the collected data flows from one devices to others. IoT offers an opportunity to address some daily life problems such as water quality, air pollution, etc. Despite of the importance of the security to secure the sensitive data and guaranty the privacy in an open world, the security of IoT has not received mush importance and it has not in priorities of developers. Recently, Ye et al. have proposed an authentication and key agreement protocol for the perception layer of IoT. Then, they showed that their protocol is efficient and secured against various attacks. Nevertheless, in this paper, we demonstrated that Ye et al.’s protocol suffers from many problems. In the other hand, we suggest some solutions that can be applied to deal with discovered problems and enhance the protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Abdmeziem, M.R., Tandjaoui, D., Romdhani, I.: Architecting the Internet of Things: state of the art. In: Robots and Sensor Clouds, pp. 55–75. Springer, Cham (2016)
“The IoT Effect: Opportunities and Challenges”, Smarter With Gartner, 28-mars-2017. [En ligne]. Disponible sur: https://www.gartner.com/smarterwithgartner/the-iot-effect-opportunities-and-challenges-2/. [Consulté le: 30-juill-2018]
Evans, D.: How the Next Evolution of the Internet Is Changing Everything. Internet Things, p. 11 (2011)
Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018)
Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the Internet of Things: a standardization perspective. IEEE Internet Things J. 1(3), 265–275 (2014)
Ye, N., Zhu, Y., Wang, R., Malekian, R., Qiao-min, L.: An efficient authentication and access control scheme for perception layer of Internet of Things. Appl. Math. Inf. Sci. 8(4), 1617–1624 (2014)
Kalraet, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210–223 (2015)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Dhillonet, P.K., Kalra, S.: Secure multi-factor remote user authentication scheme for Internet of Things environments. Int. J. Commun. Syst. 30(16), e3323 (2017)
Dhillonet, P.K., Kalra, S.: A lightweight biometrics based remote user authentication scheme for IoT services. J. Inf. Secur. Appl. 34, 255–270 (2017)
Dhillonet, P.K., Kalra, S.: Multi-factor user authentication scheme for IoT-based healthcare services. J. Reliab. Intell. Environ. (2018)
Sharma, G., Kalra, S.: A novel scheme for data security in cloud computing using quantum cryptography. In: Proceedings of the International Conference on Advances in Information Communication Technology and Computing, New York, NY, USA, pp. 37:1–37:6 (2016)
Sharma, G., Kalra, S.: Identity based secure authentication scheme based on quantum key distribution for cloud computing. Peer–Peer Netw. Appl. 11(2), 220–234 (2018)
Azrour, M., Farhaoui, Y., Ouanan, M.: A new secure authentication and key exchange protocol for session initiation protocol using smart card. Int. J. Netw. Secur. 19(6), 870–879 (2017)
Azrour, M., Ouanan, M., Farhaoui, Y.: A new efficient SIP authentication and key agreement protocol based on chaotic maps and using smart card. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, Larache, Morocco, pp. 70:1–70:8 (2017)
Azrour, M., Ouanan, M., Farhaoui, Y.: A new secure SIP authentication scheme based on elliptic curve cryptography. In: International Conference on Information Technology and Communication Systems, pp. 155–170 (2017)
Azrour, M., Farhaoui, Y., Ouanan, M.: Cryptanalysis of Farash et al.’s SIP authentication protocol. Int. J. Dyn. Syst. Differ. Equ. 8(1/2) (2018)
Azrour, M., Ouanan, M., Farhaoui, Y.: A new enhanced and secured password authentication protocol based on smart card. Int. J. Tomogr. SimulationTM 31(1), 14–26 (2018)
Azrour, M., Ouanan, M., Farhaoui, Y.: A new efficient SIP authentication and key agreement protocol based on chaotic maps and using smart card. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, New York, NY, USA, pp. 70:1–70:8 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Azrour, M., Ouanan, M., Farhaoui, Y., Guezzaz, A. (2019). Security Analysis of Ye et al. Authentication Protocol for Internet of Things. In: Farhaoui, Y., Moussaid, L. (eds) Big Data and Smart Digital Environment. ICBDSDE 2018. Studies in Big Data, vol 53. Springer, Cham. https://doi.org/10.1007/978-3-030-12048-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-12048-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12047-4
Online ISBN: 978-3-030-12048-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)