Provably secure ECC-based device access control and key agreement protocol for IoT environment

Ashok Kumar Das, Mohammad Wazid, Animi Reddy Yannam, Joel J.P.C. Rodrigues, Youngho Park

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device access control and key agreement protocol, in which the two phases, namely, 'node authentication' and 'key agreement' are involved. While the node authentication allows two sensing devices to authenticate each other using their own pre-loaded secret credentials in memory, the key agreement phase permits to establish a secret key between them if the mutual authentication is successful. In this paper, we propose a new certificate-based 'lightweight access control and key agreement protocol in the IoT environment, called LACKA-IoT,' that utilizes the elliptic curve cryptography (ECC) along with the 'collision-resistant one-way cryptographic hash function.' Through a detailed security analysis using the formal security under the 'Real-Or-Random (ROR) model,' informal (non-mathematical) security analysis, and formal security verification using the broadly used 'Automated Validation of Internet Security Protocols and Applications (AVISPA)' tool, we show that the LACKA-IoT can protect various known attacks that are needed for a secure device access control mechanism in the IoT. Furthermore, through a comparative study of the LACKA-IoT and other relevant schemes, we show that there is a better tradeoff among the security and functionality features and communication and computational costs of the LACKA-IoT as compared to other schemes. Finally, the 'practical demonstration using the NS2 simulation' has been carried out on the LACKA-IoT to measure various network parameters.

Original languageEnglish
Article number8698231
Pages (from-to)55382-55397
Number of pages16
JournalIEEE Access
Volume7
DOIs
Publication statusPublished - 01-01-2019
Externally publishedYes

Fingerprint

Access control
Cryptography
Network protocols
Authentication
Hash functions
Internet of things
Demonstrations
Internet
Data storage equipment
Communication
Costs

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Cite this

Das, A. K., Wazid, M., Yannam, A. R., Rodrigues, J. J. P. C., & Park, Y. (2019). Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access, 7, 55382-55397. [8698231]. https://doi.org/10.1109/ACCESS.2019.2912998
Das, Ashok Kumar ; Wazid, Mohammad ; Yannam, Animi Reddy ; Rodrigues, Joel J.P.C. ; Park, Youngho. / Provably secure ECC-based device access control and key agreement protocol for IoT environment. In: IEEE Access. 2019 ; Vol. 7. pp. 55382-55397.
@article{768324e0bc6746eeb04b656f4eb509b3,
title = "Provably secure ECC-based device access control and key agreement protocol for IoT environment",
abstract = "For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device access control and key agreement protocol, in which the two phases, namely, 'node authentication' and 'key agreement' are involved. While the node authentication allows two sensing devices to authenticate each other using their own pre-loaded secret credentials in memory, the key agreement phase permits to establish a secret key between them if the mutual authentication is successful. In this paper, we propose a new certificate-based 'lightweight access control and key agreement protocol in the IoT environment, called LACKA-IoT,' that utilizes the elliptic curve cryptography (ECC) along with the 'collision-resistant one-way cryptographic hash function.' Through a detailed security analysis using the formal security under the 'Real-Or-Random (ROR) model,' informal (non-mathematical) security analysis, and formal security verification using the broadly used 'Automated Validation of Internet Security Protocols and Applications (AVISPA)' tool, we show that the LACKA-IoT can protect various known attacks that are needed for a secure device access control mechanism in the IoT. Furthermore, through a comparative study of the LACKA-IoT and other relevant schemes, we show that there is a better tradeoff among the security and functionality features and communication and computational costs of the LACKA-IoT as compared to other schemes. Finally, the 'practical demonstration using the NS2 simulation' has been carried out on the LACKA-IoT to measure various network parameters.",
author = "Das, {Ashok Kumar} and Mohammad Wazid and Yannam, {Animi Reddy} and Rodrigues, {Joel J.P.C.} and Youngho Park",
year = "2019",
month = "1",
day = "1",
doi = "10.1109/ACCESS.2019.2912998",
language = "English",
volume = "7",
pages = "55382--55397",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

Das, AK, Wazid, M, Yannam, AR, Rodrigues, JJPC & Park, Y 2019, 'Provably secure ECC-based device access control and key agreement protocol for IoT environment', IEEE Access, vol. 7, 8698231, pp. 55382-55397. https://doi.org/10.1109/ACCESS.2019.2912998

Provably secure ECC-based device access control and key agreement protocol for IoT environment. / Das, Ashok Kumar; Wazid, Mohammad; Yannam, Animi Reddy; Rodrigues, Joel J.P.C.; Park, Youngho.

In: IEEE Access, Vol. 7, 8698231, 01.01.2019, p. 55382-55397.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Provably secure ECC-based device access control and key agreement protocol for IoT environment

AU - Das, Ashok Kumar

AU - Wazid, Mohammad

AU - Yannam, Animi Reddy

AU - Rodrigues, Joel J.P.C.

AU - Park, Youngho

PY - 2019/1/1

Y1 - 2019/1/1

N2 - For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device access control and key agreement protocol, in which the two phases, namely, 'node authentication' and 'key agreement' are involved. While the node authentication allows two sensing devices to authenticate each other using their own pre-loaded secret credentials in memory, the key agreement phase permits to establish a secret key between them if the mutual authentication is successful. In this paper, we propose a new certificate-based 'lightweight access control and key agreement protocol in the IoT environment, called LACKA-IoT,' that utilizes the elliptic curve cryptography (ECC) along with the 'collision-resistant one-way cryptographic hash function.' Through a detailed security analysis using the formal security under the 'Real-Or-Random (ROR) model,' informal (non-mathematical) security analysis, and formal security verification using the broadly used 'Automated Validation of Internet Security Protocols and Applications (AVISPA)' tool, we show that the LACKA-IoT can protect various known attacks that are needed for a secure device access control mechanism in the IoT. Furthermore, through a comparative study of the LACKA-IoT and other relevant schemes, we show that there is a better tradeoff among the security and functionality features and communication and computational costs of the LACKA-IoT as compared to other schemes. Finally, the 'practical demonstration using the NS2 simulation' has been carried out on the LACKA-IoT to measure various network parameters.

AB - For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device access control and key agreement protocol, in which the two phases, namely, 'node authentication' and 'key agreement' are involved. While the node authentication allows two sensing devices to authenticate each other using their own pre-loaded secret credentials in memory, the key agreement phase permits to establish a secret key between them if the mutual authentication is successful. In this paper, we propose a new certificate-based 'lightweight access control and key agreement protocol in the IoT environment, called LACKA-IoT,' that utilizes the elliptic curve cryptography (ECC) along with the 'collision-resistant one-way cryptographic hash function.' Through a detailed security analysis using the formal security under the 'Real-Or-Random (ROR) model,' informal (non-mathematical) security analysis, and formal security verification using the broadly used 'Automated Validation of Internet Security Protocols and Applications (AVISPA)' tool, we show that the LACKA-IoT can protect various known attacks that are needed for a secure device access control mechanism in the IoT. Furthermore, through a comparative study of the LACKA-IoT and other relevant schemes, we show that there is a better tradeoff among the security and functionality features and communication and computational costs of the LACKA-IoT as compared to other schemes. Finally, the 'practical demonstration using the NS2 simulation' has been carried out on the LACKA-IoT to measure various network parameters.

UR - http://www.scopus.com/inward/record.url?scp=85067079073&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85067079073&partnerID=8YFLogxK

U2 - 10.1109/ACCESS.2019.2912998

DO - 10.1109/ACCESS.2019.2912998

M3 - Article

AN - SCOPUS:85067079073

VL - 7

SP - 55382

EP - 55397

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

M1 - 8698231

ER -