A Multi-Factor Homomorphic Encryption based Method for Authenticated Access to IoT Devices

07/06/2023
by   Salem AlJanah, et al.
0

Authentication is the first defence mechanism in many electronic systems, including Internet of Things (IoT) applications, as it is essential for other security services such as intrusion detection. As existing authentication solutions proposed for IoT environments do not provide multi-level authentication assurance, particularly for device-to-device authentication scenarios, we recently proposed the M2I (Multi-Factor Multi-Level and Interaction based Authentication) framework to facilitate multi-factor authentication of devices in device-to-device and device-to-multiDevice interactions. In this paper, we extend the framework to address group authentication. Two Many-to-One (M2O) protocols are proposed, the Hybrid Group Authentication and Key Acquisition (HGAKA) protocol and the Hybrid Group Access (HGA) protocol. The protocols use a combination of symmetric and asymmetric cryptographic primitives to facilitate multifactor group authentication. The informal analysis and formal security verification show that the protocols satisfy the desirable security requirements and are secure against authentication attacks.

READ FULL TEXT
research
01/18/2022

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Existing authentication solutions proposed for Internet of Things (IoT) ...
research
08/06/2022

Analysis of lightweight cryptographic solutions for authentication in IoT

Currently, special attention is being paid to scenarios where the interc...
research
02/20/2019

Misbinding Attacks on Secure Device Pairing

In identity misbinding attacks against authenticated key-exchange protoc...
research
07/12/2019

A Federated Lightweight Authentication Protocol for the Internet of Things

Considering the world's IoT development and market, it is necessary to g...
research
09/21/2020

Adversary Models for Mobile Device Authentication

Mobile device authentication has been a highly active research topic for...
research
11/25/2019

CANTO – Covert AutheNtication with Timing channels over Optimized traffic flows for CAN

Previous research works have endorsed the use of delays and clock skews ...
research
03/20/2018

Proximity Verification Based on Acoustic Room Impulse Response

Device proximity verification has a wide range of security applications ...

Please sign up or login with your details

Forgot password? Click here to reset