Cryptanalysis and Countermeasures of 'LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems'

Deokkyu Kwon, Seunghwan Son, Youngho Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Fog computing is a technology that fog servers cover the computational tasks of cloud server. Therefore, end devices can receive more real-time and localized services from fog servers. Therefore, researchers integrate fog computing and Internet of Things (IoT) to supplement the resource constraint problem of IoT devices and process data services in network edge. In 2024, Ali et al. proposed a mutual authentication and key agreement protocol to preserve anonymous and lightweight communications in fog-driven IoT environments. They utilized only hash functions and exclusive-OR (XOR) operators considering hardware specifications of IoT devices. In this work, we cryptanalysis Ali et al.'s authentication protocol to prove that 'ephemeral secret leakage (ESL)' and 'stolen verifier attacks' can be performed in their protocol. Moreover, we discover that Ali et al.'s protocol has a 'desynchronization problem', where network entities cannot conduct authentication after initial communication. To supplement these security flaws, we conduct a discussion and present countermeasures, such as physically unclonable function (PUF), dynamic update of temporary identity, and usage of long-term secret parameters.

Original languageEnglish
Title of host publication39th International Conference on Information Networking, ICOIN 2025
PublisherIEEE Computer Society
Pages286-290
Number of pages5
ISBN (Electronic)9798331506940
DOIs
StatePublished - 2025
Event39th International Conference on Information Networking, ICOIN 2025 - Chiang Mai, Thailand
Duration: 15 Jan 202517 Jan 2025

Publication series

NameInternational Conference on Information Networking
ISSN (Print)1976-7684

Conference

Conference39th International Conference on Information Networking, ICOIN 2025
Country/TerritoryThailand
CityChiang Mai
Period15/01/2517/01/25

Keywords

  • Authentication
  • countermeasure
  • cryptanalysis
  • ephemeral secret leakage
  • stolen verifier

Fingerprint

Dive into the research topics of 'Cryptanalysis and Countermeasures of 'LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems''. Together they form a unique fingerprint.

Cite this