Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0"
Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is interconnected and accessible. Since IoT has various applications, including Industry 4.0. Therefore, upcoming and existing IoT applications are highly...
Uložené v:
| Vydané v: | IEEE internet of things journal Ročník 7; číslo 5; s. 4676 - 4681 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Piscataway
IEEE
01.05.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Predmet: | |
| ISSN: | 2327-4662, 2327-4662 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is interconnected and accessible. Since IoT has various applications, including Industry 4.0. Therefore, upcoming and existing IoT applications are highly auspicious to enhance the level of automation, efficiency, and comfort for the users. However, to a certain extent, there are numerous challenges while deploying IoT devices in the Industry 4.0, like IoT devices are assumed to have inadequate resources to support security solutions. Therefore, in order to protect the communication environment, an efficient and lightweight security solution is needed. Recently, on the basis of a hierarchical approach, Garg et al. presented a lightweight, robust key agreement, and provably secure authentication protocol for the IoT environment. Their introduced protocol relies on lightweight operations, including XOR operation, concatenation, hash function, physically unclonable function (PUF), and elliptic curve cryptography. However, in this comment, we point out the security loopholes of Garg et al. 's protocol and show that it is vulnerable to the IoT-node impersonation attack. Moreover, it has irrelevant generation and usage of some parameters. Therefore, we put forward some valuable suggestions for attack resilience. |
|---|---|
| AbstractList | Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is interconnected and accessible. Since IoT has various applications, including Industry 4.0. Therefore, upcoming and existing IoT applications are highly auspicious to enhance the level of automation, efficiency, and comfort for the users. However, to a certain extent, there are numerous challenges while deploying IoT devices in the Industry 4.0, like IoT devices are assumed to have inadequate resources to support security solutions. Therefore, in order to protect the communication environment, an efficient and lightweight security solution is needed. Recently, on the basis of a hierarchical approach, Garg et al. presented a lightweight, robust key agreement, and provably secure authentication protocol for the IoT environment. Their introduced protocol relies on lightweight operations, including XOR operation, concatenation, hash function, physically unclonable function (PUF), and elliptic curve cryptography. However, in this comment, we point out the security loopholes of Garg et al. ’s protocol and show that it is vulnerable to the IoT-node impersonation attack. Moreover, it has irrelevant generation and usage of some parameters. Therefore, we put forward some valuable suggestions for attack resilience. |
| Author | Kumari, Saru Xiong, Hu Mahmood, Khalid Akram, Muhammad Arslan |
| Author_xml | – sequence: 1 givenname: Muhammad Arslan orcidid: 0000-0001-6982-898X surname: Akram fullname: Akram, Muhammad Arslan email: arslanakram.arid@gmail.com organization: Department of Computer Science, Sahiwal Campus, COMSATS University Islamabad, Sahiwal, Pakistan – sequence: 2 givenname: Khalid orcidid: 0000-0001-5046-7766 surname: Mahmood fullname: Mahmood, Khalid email: khalid.mahmood@cuisahiwal.edu.pk organization: Department of Computer Science, Sahiwal Campus, COMSATS University Islamabad, Sahiwal, Pakistan – sequence: 3 givenname: Saru orcidid: 0000-0003-4929-5383 surname: Kumari fullname: Kumari, Saru email: saryusiirohi@gmail.com organization: Department of Mathematics, Chaudhary Charan Singh University, Meerut, India – sequence: 4 givenname: Hu orcidid: 0000-0001-6137-6667 surname: Xiong fullname: Xiong, Hu email: xionghu.uestc@gmail.com organization: School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China |
| BookMark | eNp9kE1LAzEQhoNUsNb-APES6nlrvnaz8VaKH5VCRet5yWazdkub1CSr1F9vaouIB08zMM8zw7ynoGOs0QCcYzTEGImrh8lsPiSIoCERnDOeHoEuoYQnLMtI51d_AvreLxFCUUuxyLqgHtv1WpvgoTVwMLcf0lXwWavWaShNBR-dfZflSsNRGxaRa5QMTURr6-DEBO2MDtDWcL5ozKu_hk9arprP2Mdp1frgtpAN0eAMHNdy5XX_UHvg5fZmPr5PprO7yXg0TRQRNCSSqFRRmuZM5mnJeIWVJLikhOasYrLMGc-JqAVJhdCIZUxJrsq8pjjnOk5pD1zu926cfWu1D8XSts7EkwVhiKQIIyoixfeUctZ7p-tCNeH7r-BksyowKna5Frtci12uxSHXaOI_5sY1a-m2_zoXe6fRWv_wAhEqMkS_ALMsg_M |
| CODEN | IITJAU |
| CitedBy_id | crossref_primary_10_1007_s11277_021_08430_2 crossref_primary_10_1007_s12652_020_02532_8 crossref_primary_10_1109_JSYST_2023_3269046 crossref_primary_10_1109_JSYST_2020_3015424 crossref_primary_10_1007_s11277_024_11318_6 crossref_primary_10_1007_s10207_022_00595_6 crossref_primary_10_1109_JSYST_2021_3131689 crossref_primary_10_1016_j_comcom_2024_04_011 crossref_primary_10_1016_j_comnet_2020_107592 crossref_primary_10_1002_ett_4842 crossref_primary_10_1007_s12083_021_01236_w |
| Cites_doi | 10.1109/JIOT.2019.2939534 10.1109/TWC.2015.2473165 10.1109/TII.2019.2939573 10.3390/s19112613 10.1109/JIOT.2019.2942271 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/JIOT.2020.2977475 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 4681 |
| ExternalDocumentID | 10_1109_JIOT_2020_2977475 9023960 |
| Genre | orig-research |
| GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c293t-a2c5c33584a85b47d1ca21b32384d4ab847829f92599e0464ca7cb8f3187eb843 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 15 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000536066300088&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2327-4662 |
| IngestDate | Sun Nov 09 08:35:12 EST 2025 Tue Nov 18 20:44:36 EST 2025 Sat Nov 29 06:16:49 EST 2025 Wed Aug 27 02:38:15 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-a2c5c33584a85b47d1ca21b32384d4ab847829f92599e0464ca7cb8f3187eb843 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-6982-898X 0000-0001-5046-7766 0000-0001-6137-6667 0000-0003-4929-5383 |
| PQID | 2402501039 |
| PQPubID | 2040421 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_9023960 crossref_primary_10_1109_JIOT_2020_2977475 proquest_journals_2402501039 crossref_citationtrail_10_1109_JIOT_2020_2977475 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-05-01 |
| PublicationDateYYYYMMDD | 2020-05-01 |
| PublicationDate_xml | – month: 05 year: 2020 text: 2020-05-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2020 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref2 ref1 ref4 ref3 ref5 |
| References_xml | – ident: ref3 doi: 10.1109/JIOT.2019.2939534 – ident: ref5 doi: 10.1109/TWC.2015.2473165 – ident: ref2 doi: 10.1109/TII.2019.2939573 – ident: ref1 doi: 10.3390/s19112613 – ident: ref4 doi: 10.1109/JIOT.2019.2942271 |
| SSID | ssj0001105196 |
| Score | 2.255491 |
| Snippet | Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that everything within the global communication network is... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 4676 |
| SubjectTerms | Authentication Communication Communication networks Cryptography Curves Industrial applications Industries Industry 4.0 Internet of Things Internet-of-Things (IoT)-node impersonation attack Lightweight Protocols Public key Security Security loopholes Servers |
| Title | Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0" |
| URI | https://ieeexplore.ieee.org/document/9023960 https://www.proquest.com/docview/2402501039 |
| Volume | 7 |
| WOSCitedRecordID | wos000536066300088&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGA5zePDi1ClOp4ThSeyWfqbxJuJQkTlkwm4lSVMQpJWtG-ivN2-STUERvAWatCVP0_f7fRA6K9KcFixnXiAj7kVUEY9RnnuMCKo0KiKxTVwf6GiUTqds3EAX61oYpZRJPlN9GJpYfl7JBbjKBgwqMRNtoG9QmtharS9_ig_KSOIClz5hg_u7x4k2AAPSD0DJgUzCb6LHcKn8-AEbqTJs_e99dtC20x7xlYV7FzVUuYdaK2YG7A5qGxVQ9wEpErgqcW9iUmOxca0rzMscj2fVEmqmMHjIIF_IOu6w1mCx9RGqGlcFtqyel_hJq5MvH3qMHdXHO476pLePnoc3k-tbzzEqeFKL9drjgYxlGGqlg6exiGjuSx74ItRyO8ojLrSoSgNWMG0TMQVBT8mpFGmhDz5V-mp4gJplVapDhGM9TcRCMh6GERhRqSJUJUrqRxSUkA4iq83OpGs3DqwXr5kxOwjLAJ8M8MkcPh10vl7yZntt_DW5DYCsJzosOqi7QjRzp3GeQQQpBkILdvT7qmO0Bfe2iYxd1KxnC3WCNuWyfpnPTs2H9gnqxdCL |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD6MKeiL84rTqWH4JHbL2nRpfBNxbDqnyIS9lTRNQZBWZjfQX29Om01BEXwLNCGlX9JzPx_AaRLEPBGxcFzFpMO4po7gMnYEjbg2qETdsonrkI9GwWQiHipwvqyF0VoXyWe6hcMilh9naoausrbASsyuMdBXfMZcWlZrfXlUOqiOdG3oskNF-2ZwPzYmoEtbLqo5mEv4TfgUbCo_fsGFXOnV_vdGm7Bh9UdyWQK-BRWdbkNtwc1A7FXdgQQrPzBJgmQpaY6L5FhSONc1kWlMHqbZHKumCPrIMGOodN0Ro8OS0kuoc5IlpOT1vCCPRqF8_jBjYsk-3glr0eYuPPWux1d9x3IqOMoI9tyRrvKV5xm1QwZ-xHjcUdLtRJ6R3CxmMjLCKnBFIoxVJDSGPZXkKgoSc_W5Nk-9PaimWar3gfhmWuRHSkjPY2hGBZpy3dXKbJFwSutAFx87VLbhOPJevISF4UFFiPiEiE9o8anD2XLJa9lt46_JOwjIcqLFog6NBaKhvY9vIcaQfKS0EAe_rzqBtf74bhgOB6PbQ1jHfcq0xgZU8-lMH8GqmufPb9Pj4tB9AuyJ09I |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comments+on+%E2%80%9CToward+Secure+and+Provable+Authentication+for+Internet+of+Things%3A+Realizing+Industry+4.0%E2%80%9D&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Muhammad+Arslan+Akram&rft.au=Mahmood%2C+Khalid&rft.au=Kumari%2C+Saru&rft.au=Hu%2C+Xiong&rft.date=2020-05-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2327-4662&rft.volume=7&rft.issue=5&rft.spage=4676&rft_id=info:doi/10.1109%2FJIOT.2020.2977475&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |