Lightweight Two-Factor Authentication With S-Box Flipping Module for IoT Security

Lightweight Two-Factor Authentication With S-Box Flipping Module for IoT Security

Sivabalan N., Murugan B. S.
Copyright: © 2022 |Pages: 24
DOI: 10.4018/IJeC.299003
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In recent days, the usage of cloud computing in wireless networks offers more advantages to the users by storing resources with less complexity and ease to control. Data security is considered a critical aspect in a cloud computing environment due to the sensitive and confidential information of users stored in IOT. So, this paper introduces a Lightweight and Privacy-Preserving Two-Factor Authentication (TFA) with S-box based Flipping Module (SBFM) to provide data security for a user. The proposed scheme uses Unclonable Function Key (UFK) to provide a better solution for highly-secured cloud computing. Moreover, Reconfigurable Unpredictable Response Value (RURV) helps to generate the different response values for every clock cycle in IoT. Finally, Spartan 6 Field Programmable Gate Array (FPGA) performances of the proposed TFA-RURV-IoT are compared to existing TFA-URV-IoT protocols, whereas the simulation results show that proposed TFA-RURV-IoT achieves better results in terms of LUT, slices and flip flops.
Article Preview
Top

Introduction

Nowadays, the Internet of Things (IoT) is becoming an intriguing trend worldwide as it allows any device to create and participate in a highly immersive and connected environment by integrating physical, digital, and social aspects of the users to react according to the user requirements (Esfahani et al. 2017), (Wang et al. 2018). The success of an IoT application depends on how well it fulfills certain design considerations like reliability, quality of service, security, scalability of the applications, among which security issues gain more importance in the real world because of the exposure of vulnerabilities in IoT applications (Akbarzadeh et al. 2019), (Hernandez-Ramos et al. 2015). Furthermore, it can have serious consequences and is significant to set up an enhanced mechanism for assuring security. The perpetual growth in the number of devices tends to create more vulnerabilities if these devices are not authenticated before the device communicates (Zhou et al. 2019). However, designing a security mechanism for IoT is a challenging task due to the resource-constrained nature of the underlying sensor elements in the network (Joshitta et al. 2016). Authentication is considered as one of the most important, newest, and fastest-growing mechanisms in the communication area, and this process is supported by IoT devices, (Ometov et al. 2019).

IoT consisting of integrating sensors at daily smart objects that are linked to the Internet through wireless sensor networks that lead to open the door to new methods of exchanging the data (Farash et al. 2018). However, these IoT devices mostly follow wireless communication which raises the curtain for various security challenges related to wireless sensor networks (Mohit et al. 2019). The problem of node authentication in the network is always a major concern in wireless sensor networks (Li et al. 2018). In IoT, whenever a device initiates the communication, data collection and data aggregation, there is a possibility for the intrusion of attackers (Devi et al. 2015). The attacker accesses critical data of the communication and can modify the settings of the devices (Mishra et al. 2019). IoT devices are susceptible to different security attacks like impersonation, replay attacks which brings up the imperative need for a security mechanism. Also, checks the authenticity of the devices before the data collection and data acquisition tasks get completed (Yang et al. 2020). Also, IoT devices possess limited memory and processing power (Li et al. 2017) which causes the draining of resources that brings the necessity for the cryptographic protocols to reduce the computation overhead and prolong their lifetime (El-hajj et al. 2019). To overcome the aforementioned problems, two factor authentication models for different network environments are introduced to improve data security. The main objective and contribution of the research work is given as follows:

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing