Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment

Shobhan Mandal, Basudeb Bera, Anil Kumar Sutrala, Ashok Kumar Das, Kim Kwang Raymond Choo, Young Ho Park

Research output: Contribution to journalArticlepeer-review

127 Scopus citations

Abstract

User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication, and revocation of a registered legitimate user to access real-time information and/or service directly from the IoT devices. To complement the existing literature, we design a new three-factor certificateless-signcryption-based user access control for the IoT environment (CSUAC-IoT). Specifically, in our scheme, a user 'U' 's password, personal biometrics, and mobile device are used as the three authentication factors. By executing the login and access control phase of CSUAC-IoT, a registered user '(U)' and a designated smart device '(S-{i})' can authorize and authenticate mutually via the trusted gateway node (GN) in a particular cell of the IoT environment. In our setting, the environment is partitioned into disjoint cells, and each cell will contain a certain number of IoT devices along with a GN. With the established session key between 'U' and 'S-{i}' , both entities can then communicate securely. In addition, CSUAC-IoT supports new IoT devices deployment, user revocation, and password/biometric update functionality features. We prove the security of CSUAC-IoT under the real-or-random (ROR) model, and demonstrate that it can resist several common attacks found in a typical IoT environment using the AVISPA tool. A comparative analysis also reveals that CSUAC-IoT achieves better tradeoff for security and functionality, and computational and communication costs, in comparison to five other competing approaches.

Original languageEnglish
Article number8957688
Pages (from-to)3184-3197
Number of pages14
JournalIEEE Internet of Things Journal
Volume7
Issue number4
DOIs
StatePublished - Apr 2020

Keywords

  • Automated validation of Internet security protocols and application (AVISPA)
  • Internet of Things (IoT)
  • key agreement
  • security
  • signcryption
  • user access control

Fingerprint

Dive into the research topics of 'Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment'. Together they form a unique fingerprint.

Cite this