TY - JOUR
T1 - Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment
AU - Mandal, Shobhan
AU - Bera, Basudeb
AU - Sutrala, Anil Kumar
AU - Das, Ashok Kumar
AU - Choo, Kim Kwang Raymond
AU - Park, Young Ho
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2020/4
Y1 - 2020/4
N2 - User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication, and revocation of a registered legitimate user to access real-time information and/or service directly from the IoT devices. To complement the existing literature, we design a new three-factor certificateless-signcryption-based user access control for the IoT environment (CSUAC-IoT). Specifically, in our scheme, a user 'U' 's password, personal biometrics, and mobile device are used as the three authentication factors. By executing the login and access control phase of CSUAC-IoT, a registered user '(U)' and a designated smart device '(S-{i})' can authorize and authenticate mutually via the trusted gateway node (GN) in a particular cell of the IoT environment. In our setting, the environment is partitioned into disjoint cells, and each cell will contain a certain number of IoT devices along with a GN. With the established session key between 'U' and 'S-{i}' , both entities can then communicate securely. In addition, CSUAC-IoT supports new IoT devices deployment, user revocation, and password/biometric update functionality features. We prove the security of CSUAC-IoT under the real-or-random (ROR) model, and demonstrate that it can resist several common attacks found in a typical IoT environment using the AVISPA tool. A comparative analysis also reveals that CSUAC-IoT achieves better tradeoff for security and functionality, and computational and communication costs, in comparison to five other competing approaches.
AB - User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication, and revocation of a registered legitimate user to access real-time information and/or service directly from the IoT devices. To complement the existing literature, we design a new three-factor certificateless-signcryption-based user access control for the IoT environment (CSUAC-IoT). Specifically, in our scheme, a user 'U' 's password, personal biometrics, and mobile device are used as the three authentication factors. By executing the login and access control phase of CSUAC-IoT, a registered user '(U)' and a designated smart device '(S-{i})' can authorize and authenticate mutually via the trusted gateway node (GN) in a particular cell of the IoT environment. In our setting, the environment is partitioned into disjoint cells, and each cell will contain a certain number of IoT devices along with a GN. With the established session key between 'U' and 'S-{i}' , both entities can then communicate securely. In addition, CSUAC-IoT supports new IoT devices deployment, user revocation, and password/biometric update functionality features. We prove the security of CSUAC-IoT under the real-or-random (ROR) model, and demonstrate that it can resist several common attacks found in a typical IoT environment using the AVISPA tool. A comparative analysis also reveals that CSUAC-IoT achieves better tradeoff for security and functionality, and computational and communication costs, in comparison to five other competing approaches.
KW - Automated validation of Internet security protocols and application (AVISPA)
KW - Internet of Things (IoT)
KW - key agreement
KW - security
KW - signcryption
KW - user access control
UR - https://www.scopus.com/pages/publications/85082958414
U2 - 10.1109/JIOT.2020.2966242
DO - 10.1109/JIOT.2020.2966242
M3 - Article
AN - SCOPUS:85082958414
SN - 2327-4662
VL - 7
SP - 3184
EP - 3197
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 4
M1 - 8957688
ER -