Security Analysis of Ye et al. Authentication Protocol for Internet of Things

Internet of Things (IoT) is a muti-layer technology that allows to devices (sensors and actuators) to connect and exchange data. In the last decade, IoT has known a great growth rapidly. As result of this exponential development, the collected data flows

  • PDF / 378,441 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 86 Downloads / 159 Views

DOWNLOAD

REPORT


Faculty of Science and Technology, Department of Computer Science, M2I Laboratory, ASIA Team, Moulay Ismail University, Errachidia, Morocco [email protected] 2 Technology High School, Essaouira Cadi Ayyad University, Marrakech, Morocco

Abstract. Internet of Things (IoT) is a muti-layer technology that allows to devices (sensors and actuators) to connect and exchange data. In the last decade, IoT has known a great growth rapidly. As result of this exponential development, the collected data flows from one devices to others. IoT offers an opportunity to address some daily life problems such as water quality, air pollution, etc. Despite of the importance of the security to secure the sensitive data and guaranty the privacy in an open world, the security of IoT has not received mush importance and it has not in priorities of developers. Recently, Ye et al. have proposed an authentication and key agreement protocol for the perception layer of IoT. Then, they showed that their protocol is efficient and secured against various attacks. Nevertheless, in this paper, we demonstrated that Ye et al.’s protocol suffers from many problems. In the other hand, we suggest some solutions that can be applied to deal with discovered problems and enhance the protocol. Keywords: Internet of Things Authentication protocol

 IoT  Security  Authentication 

1 Introduction Internet of Things (IoT) is a new technology that refers to a big network connecting between objects, devices, and other things that we can imagine. The connected objects are equipped with sensors for collecting data in their environment and have network connectivity that allows them to connect to the network, to exchange data and information with other network parts, and to interact with users and specific applications [1]. As depicted in Fig. 1, IoT consists of three layers which are Perception Layer, Network Layer, and Application layer [2]. The first one has as function to collect the data from the around of devices for example light sensor, gas sensor, camera, GPS, just to name a few. The second one allows transferring the collected data and exchanging the information between the elements of the network. Various network technologies can be used in this layer such as Bluetooth, Wi-Fi, 3G/4G/5G, Zigbee, etc. The last layer is the end

© Springer Nature Switzerland AG 2019 Y. Farhaoui and L. Moussaid (Eds.): ICBDSDE 2018, SBD 53, pp. 67–74, 2019. https://doi.org/10.1007/978-3-030-12048-1_9

68

M. Azrour et al.

of the architecture; it uses the processed data from the network layer to offer to users the necessary tools to develop the possible applications such as smart home, smart garden, and so ones.

Fig. 1. IoT architecture

The number of connected things is growing rapidly day by day. According to Gartner the total of connected object in 2020 will be more than 20 billion objects [3]. In the other hand, CISCO expected that the number of connected objects will be reach 50 billion objects by the end of 2020 [4]. Nowadays, the IoT applications affect all areas