Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Smart Card-Based Secure Authentication Protocol in Multi-Server IoT Environment

Version 1 : Received: 8 May 2017 / Approved: 9 May 2017 / Online: 9 May 2017 (04:38:37 CEST)

How to cite: Bae, W.; Kwak, J. Smart Card-Based Secure Authentication Protocol in Multi-Server IoT Environment. Preprints 2017, 2017050076. https://doi.org/10.20944/preprints201705.0076.v1 Bae, W.; Kwak, J. Smart Card-Based Secure Authentication Protocol in Multi-Server IoT Environment. Preprints 2017, 2017050076. https://doi.org/10.20944/preprints201705.0076.v1

Abstract

In recent years, the internet of things has been widely utilized in various fields, such as in smart factories or connected cars. As its domain of application has expanded, it has begun to be employed using multi-server architectures for a more efficient use of resources. However, because users wishing to receive IoT services connect to multi-servers over wireless networks, this can expose systems to various attacks and result in serious security risks. To protect systems (and users) from potential security vulnerabilities, a secure authentication technology is necessary. In this paper, we propose a smart card-based authentication protocol, which performs the authentication for each entity by allowing users to go through the authentication process using a smart card transmitted from an authentication server, and to login to a server connected to the IoT. Furthermore, the security of our proposed authentication protocol is verified by simulating a formal verification scenario using AVISPA, a security protocol-verification tool.

Keywords

user authentication; multi server; internet of things; formal verification; security

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.