J 2020

An Efficient Mutual Authentication Scheme for Internet of Things

MBAREK, Bacem; Mouzhi GE and Tomáš PITNER

Basic information

Original name

An Efficient Mutual Authentication Scheme for Internet of Things

Authors

MBAREK, Bacem (788 Tunisia, belonging to the institution); Mouzhi GE (156 China, guarantor, belonging to the institution) and Tomáš PITNER ORCID (203 Czech Republic, belonging to the institution)

Edition

Internet of Things Journal, ELSEVIER, 2020, 2543-1536

Other information

Language

English

Type of outcome

Article in a journal

Field of Study

10200 1.2 Computer and information sciences

Country of publisher

Netherlands

Confidentiality degree

is not subject to a state or trade secret

References:

RIV identification code

RIV/00216224:14330/20:00120542

Organization unit

Faculty of Informatics

UT WoS

000695693900022

EID Scopus

2-s2.0-85087630341

Keywords in English

Internet of Things; RFID; Authentication; Jamming attack; IoT security

Tags

International impact, Reviewed
Changed: 23/5/2022 14:15, RNDr. Pavel Šmerk, Ph.D.

Abstract

In the original language

The Internet of Things (IoT) is developed to facilitate the connections and data sharing among people, devices, and systems. Among the infrastructural IoT techniques, Radio Frequency IDentification (RFID) has been used to enable the proliferation and communication in IoT networks. However, the RFID techniques usually suffer from security issues due to the inherent weaknesses of underlying wireless radio communications. One of the main security issues is the authentication vulnerability from the jamming attack. In order to tackle the vulnerabilities of key updating algorithms, this paper therefore proposes an efficient authentication scheme based on the self-adaptive and mutual key updating. Furthermore, we evaluate the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption, authentication failure rate and authentication delay. The feasibility and applicability are demonstrated by implementing the proposed authentication scheme in smart home IoT systems. (C) 2020 Elsevier B.V. All rights reserved.