Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"

Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is interconnected and accessible. Since IoT has various applications, including Industry 4.0. Therefore, upcoming and existing IoT applications are highly...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE internet of things journal Ročník 7; číslo 5; s. 4676 - 4681
Hlavní autori: Akram, Muhammad Arslan, Mahmood, Khalid, Kumari, Saru, Xiong, Hu
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Piscataway IEEE 01.05.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:2327-4662, 2327-4662
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is interconnected and accessible. Since IoT has various applications, including Industry 4.0. Therefore, upcoming and existing IoT applications are highly auspicious to enhance the level of automation, efficiency, and comfort for the users. However, to a certain extent, there are numerous challenges while deploying IoT devices in the Industry 4.0, like IoT devices are assumed to have inadequate resources to support security solutions. Therefore, in order to protect the communication environment, an efficient and lightweight security solution is needed. Recently, on the basis of a hierarchical approach, Garg et al. presented a lightweight, robust key agreement, and provably secure authentication protocol for the IoT environment. Their introduced protocol relies on lightweight operations, including XOR operation, concatenation, hash function, physically unclonable function (PUF), and elliptic curve cryptography. However, in this comment, we point out the security loopholes of Garg et al. 's protocol and show that it is vulnerable to the IoT-node impersonation attack. Moreover, it has irrelevant generation and usage of some parameters. Therefore, we put forward some valuable suggestions for attack resilience.
AbstractList Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is interconnected and accessible. Since IoT has various applications, including Industry 4.0. Therefore, upcoming and existing IoT applications are highly auspicious to enhance the level of automation, efficiency, and comfort for the users. However, to a certain extent, there are numerous challenges while deploying IoT devices in the Industry 4.0, like IoT devices are assumed to have inadequate resources to support security solutions. Therefore, in order to protect the communication environment, an efficient and lightweight security solution is needed. Recently, on the basis of a hierarchical approach, Garg et al. presented a lightweight, robust key agreement, and provably secure authentication protocol for the IoT environment. Their introduced protocol relies on lightweight operations, including XOR operation, concatenation, hash function, physically unclonable function (PUF), and elliptic curve cryptography. However, in this comment, we point out the security loopholes of Garg et al. ’s protocol and show that it is vulnerable to the IoT-node impersonation attack. Moreover, it has irrelevant generation and usage of some parameters. Therefore, we put forward some valuable suggestions for attack resilience.
Author Kumari, Saru
Xiong, Hu
Mahmood, Khalid
Akram, Muhammad Arslan
Author_xml – sequence: 1
  givenname: Muhammad Arslan
  orcidid: 0000-0001-6982-898X
  surname: Akram
  fullname: Akram, Muhammad Arslan
  email: arslanakram.arid@gmail.com
  organization: Department of Computer Science, Sahiwal Campus, COMSATS University Islamabad, Sahiwal, Pakistan
– sequence: 2
  givenname: Khalid
  orcidid: 0000-0001-5046-7766
  surname: Mahmood
  fullname: Mahmood, Khalid
  email: khalid.mahmood@cuisahiwal.edu.pk
  organization: Department of Computer Science, Sahiwal Campus, COMSATS University Islamabad, Sahiwal, Pakistan
– sequence: 3
  givenname: Saru
  orcidid: 0000-0003-4929-5383
  surname: Kumari
  fullname: Kumari, Saru
  email: saryusiirohi@gmail.com
  organization: Department of Mathematics, Chaudhary Charan Singh University, Meerut, India
– sequence: 4
  givenname: Hu
  orcidid: 0000-0001-6137-6667
  surname: Xiong
  fullname: Xiong, Hu
  email: xionghu.uestc@gmail.com
  organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China
BookMark eNp9kE1LAzEQhoNUsNb-APES6nlrvnaz8VaKH5VCRet5yWazdkub1CSr1F9vaouIB08zMM8zw7ynoGOs0QCcYzTEGImrh8lsPiSIoCERnDOeHoEuoYQnLMtI51d_AvreLxFCUUuxyLqgHtv1WpvgoTVwMLcf0lXwWavWaShNBR-dfZflSsNRGxaRa5QMTURr6-DEBO2MDtDWcL5ozKu_hk9arprP2Mdp1frgtpAN0eAMHNdy5XX_UHvg5fZmPr5PprO7yXg0TRQRNCSSqFRRmuZM5mnJeIWVJLikhOasYrLMGc-JqAVJhdCIZUxJrsq8pjjnOk5pD1zu926cfWu1D8XSts7EkwVhiKQIIyoixfeUctZ7p-tCNeH7r-BksyowKna5Frtci12uxSHXaOI_5sY1a-m2_zoXe6fRWv_wAhEqMkS_ALMsg_M
CODEN IITJAU
CitedBy_id crossref_primary_10_1007_s11277_021_08430_2
crossref_primary_10_1007_s12652_020_02532_8
crossref_primary_10_1109_JSYST_2023_3269046
crossref_primary_10_1109_JSYST_2020_3015424
crossref_primary_10_1007_s11277_024_11318_6
crossref_primary_10_1007_s10207_022_00595_6
crossref_primary_10_1109_JSYST_2021_3131689
crossref_primary_10_1016_j_comcom_2024_04_011
crossref_primary_10_1016_j_comnet_2020_107592
crossref_primary_10_1002_ett_4842
crossref_primary_10_1007_s12083_021_01236_w
Cites_doi 10.1109/JIOT.2019.2939534
10.1109/TWC.2015.2473165
10.1109/TII.2019.2939573
10.3390/s19112613
10.1109/JIOT.2019.2942271
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/JIOT.2020.2977475
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 4681
ExternalDocumentID 10_1109_JIOT_2020_2977475
9023960
Genre orig-research
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-a2c5c33584a85b47d1ca21b32384d4ab847829f92599e0464ca7cb8f3187eb843
IEDL.DBID RIE
ISICitedReferencesCount 15
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000536066300088&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2327-4662
IngestDate Sun Nov 09 08:35:12 EST 2025
Tue Nov 18 20:44:36 EST 2025
Sat Nov 29 06:16:49 EST 2025
Wed Aug 27 02:38:15 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 5
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-a2c5c33584a85b47d1ca21b32384d4ab847829f92599e0464ca7cb8f3187eb843
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6982-898X
0000-0001-5046-7766
0000-0001-6137-6667
0000-0003-4929-5383
PQID 2402501039
PQPubID 2040421
PageCount 6
ParticipantIDs ieee_primary_9023960
crossref_primary_10_1109_JIOT_2020_2977475
proquest_journals_2402501039
crossref_citationtrail_10_1109_JIOT_2020_2977475
PublicationCentury 2000
PublicationDate 2020-05-01
PublicationDateYYYYMMDD 2020-05-01
PublicationDate_xml – month: 05
  year: 2020
  text: 2020-05-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref2
ref1
ref4
ref3
ref5
References_xml – ident: ref3
  doi: 10.1109/JIOT.2019.2939534
– ident: ref5
  doi: 10.1109/TWC.2015.2473165
– ident: ref2
  doi: 10.1109/TII.2019.2939573
– ident: ref1
  doi: 10.3390/s19112613
– ident: ref4
  doi: 10.1109/JIOT.2019.2942271
SSID ssj0001105196
Score 2.255491
Snippet Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4676
SubjectTerms Authentication
Communication
Communication networks
Cryptography
Curves
Industrial applications
Industries
Industry 4.0
Internet of Things
Internet-of-Things (IoT)-node impersonation attack
Lightweight
Protocols
Public key
Security
Security loopholes
Servers
Title Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"
URI https://ieeexplore.ieee.org/document/9023960
https://www.proquest.com/docview/2402501039
Volume 7
WOSCitedRecordID wos000536066300088&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2327-4662
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001105196
  issn: 2327-4662
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGA5zePDi1ClOp4ThSeyWfqbxJuJQkTlkwm4lSVMQpJWtG-ivN2-STUERvAWatCVP0_f7fRA6K9KcFixnXiAj7kVUEY9RnnuMCKo0KiKxTVwf6GiUTqds3EAX61oYpZRJPlN9GJpYfl7JBbjKBgwqMRNtoG9QmtharS9_ig_KSOIClz5hg_u7x4k2AAPSD0DJgUzCb6LHcKn8-AEbqTJs_e99dtC20x7xlYV7FzVUuYdaK2YG7A5qGxVQ9wEpErgqcW9iUmOxca0rzMscj2fVEmqmMHjIIF_IOu6w1mCx9RGqGlcFtqyel_hJq5MvH3qMHdXHO476pLePnoc3k-tbzzEqeFKL9drjgYxlGGqlg6exiGjuSx74ItRyO8ojLrSoSgNWMG0TMQVBT8mpFGmhDz5V-mp4gJplVapDhGM9TcRCMh6GERhRqSJUJUrqRxSUkA4iq83OpGs3DqwXr5kxOwjLAJ8M8MkcPh10vl7yZntt_DW5DYCsJzosOqi7QjRzp3GeQQQpBkILdvT7qmO0Bfe2iYxd1KxnC3WCNuWyfpnPTs2H9gnqxdCL
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD6MKeiL84rTqWH4JHbL2nRpfBNxbDqnyIS9lTRNQZBWZjfQX29Om01BEXwLNCGlX9JzPx_AaRLEPBGxcFzFpMO4po7gMnYEjbg2qETdsonrkI9GwWQiHipwvqyF0VoXyWe6hcMilh9naoausrbASsyuMdBXfMZcWlZrfXlUOqiOdG3oskNF-2ZwPzYmoEtbLqo5mEv4TfgUbCo_fsGFXOnV_vdGm7Bh9UdyWQK-BRWdbkNtwc1A7FXdgQQrPzBJgmQpaY6L5FhSONc1kWlMHqbZHKumCPrIMGOodN0Ro8OS0kuoc5IlpOT1vCCPRqF8_jBjYsk-3glr0eYuPPWux1d9x3IqOMoI9tyRrvKV5xm1QwZ-xHjcUdLtRJ6R3CxmMjLCKnBFIoxVJDSGPZXkKgoSc_W5Nk-9PaimWar3gfhmWuRHSkjPY2hGBZpy3dXKbJFwSutAFx87VLbhOPJevISF4UFFiPiEiE9o8anD2XLJa9lt46_JOwjIcqLFog6NBaKhvY9vIcaQfKS0EAe_rzqBtf74bhgOB6PbQ1jHfcq0xgZU8-lMH8GqmufPb9Pj4tB9AuyJ09I
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comments+on+%E2%80%9CToward+Secure+and+Provable+Authentication+for+Internet+of+Things%3A+Realizing+Industry+4.0%E2%80%9D&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Muhammad+Arslan+Akram&rft.au=Mahmood%2C+Khalid&rft.au=Kumari%2C+Saru&rft.au=Hu%2C+Xiong&rft.date=2020-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=7&rft.issue=5&rft.spage=4676&rft_id=info:doi/10.1109%2FJIOT.2020.2977475&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon