|1/2022 - 4|
A Strong Mutual Authentication Protocol for Securing Wearable Smart Textile ApplicationsDALKILIC, H. , OZCANHAN, M. H.
|View the paper record and citations in|
|Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science|
|Download PDF (1,712 KB) | Citation | Downloads: 340 | Views: 273|
authentication, cryptography, Internet of Things, message authentication, wearable sensors
authentication(23), security(14), internet(14), smart(13), secure(13), scheme(10), protocol(9), computing(8), networks(7), applications(7)
Blue keywords are present in both the references section and the paper title.
About this article
Date of Publication: 2022-02-28
Volume 22, Issue 1, Year 2022, On page(s): 31 - 38
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2022.01004
Web of Science Accession Number: 000807483500001
SCOPUS ID: 85126806389
With increasing modern technology involvement in numerous consumer areas, our cities are gradually turning into smart urban areas. Wireless technologies have especially been playing a pivotal role in making cities smarter. The popular name for wireless wearable devices is the wearable Internet of Things (IoT). Wearable IoT has begun a smart textiles movement. However, wearable IoT increased wirelessly transmitted data, opening avenues for critical data capture by unauthorized listeners. The present study offers a typical wearable textile IoT device with information security. Our work proposes a novel mutual authentication protocol between IoT devices and their gateway, supported by a state-of-the-art encryption algorithm. The protocol can increase the information security of similar smart textiles. In addition to an informal security evaluation, our protocol has been tested by two formal security analysis tools. The popular Scyther and AVISPA tools verify that the data transmission between our design wearable textile and the gateway is secure. A comparison of our work with previous proposals shows the comprehensiveness of our design and its applicability to other IoT devices, as well.
|References|||||Cited By «-- Click to see who has cited this paper|
| S. Li, L. D. Xu, S. Zhao, "The Internet of things: a survey," Information Systems Frontiers, vol. 17, no. 2, pp. 243-259, 2015. |
[CrossRef] [SCOPUS Times Cited 1082]
 M. H. Ozcanhan, "A new peculiarity to intelligent doors: security through information sharing," Pamukkale University Journal of Engineering Sciences, vol. 23, no. 5, pp. 581-587, 2017.
[CrossRef] [Web of Science Times Cited 1]
 M. Kamal, M. Atif, H. Mujahid, T. Shanableh, A. R. Al-Ali et al., "IoT based smart city bus stops," Future Internet, vol. 11, no. 11, 2019.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 7]
 H. A. Khattak, H. Farman, B. Jan, I. U. Din, "Toward integrating vehicular clouds with IoT for smart city services," IEEE Network, vol. 33, no. 2, pp. 65-71, 2019.
[CrossRef] [Web of Science Times Cited 50] [SCOPUS Times Cited 59]
 N. Mohamed, J. Al-Jaroodi, I. Jawhar, "Towards fault tolerant fog computing for IoT-based smart city applications," In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0752-0757, 2019.
[CrossRef] [SCOPUS Times Cited 25]
 L. Zhao, J. Wang, J. Liu, N. Kato, "Optimal edge resource allocation in IoT-based smart cities," IEEE Network, vol. 33, no. 2, pp. 30-35, 2019.
[CrossRef] [Web of Science Times Cited 64] [SCOPUS Times Cited 68]
 J. V. Jacobs, L. J. Hettinger, Y. H. Huang, S. Jeffries, M. F. Lesch et al., "Employee acceptance of wearable technology in the workplace," Applied Ergonomics, vol. 78, pp. 148-156, 2019.
[CrossRef] [Web of Science Times Cited 39] [SCOPUS Times Cited 50]
 G. Aroganam, N. Manivannan, D. Harrison, "Review on wearable technology sensors used in consumer sport applications," Sensors, vol. 19, no. 9, 2019.
[CrossRef] [Web of Science Times Cited 96] [SCOPUS Times Cited 113]
 Z. A. Alizai, N. F. Tareen, I. Jadoon, "Improved IoT device authentication scheme using device capability and digital signatures," In 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 1-5, 2018.
[CrossRef] [SCOPUS Times Cited 34]
 I. Ali, S. Sabir, Z. Ullah, "Internet of things security, device authentication and access control: a review," International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 8, pp. 456-466, 2016
 K. Fan, Q. Luo, K. Zhang, Y. Yang, "Cloud-based lightweight secure RFID mutual authentication protocol in IoT," Information Sciences, vol. 527, pp. 329-340, 2020.
[CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 21]
 M. Alshahrani, I. Traore, "Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain," Journal of information security and applications, vol. 45, pp. 156-175, 2019.
[CrossRef] [Web of Science Times Cited 29] [SCOPUS Times Cited 40]
 M. Adeli, N. Bagheri, "Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP," IACR Cryptol. ePrint Arch, 2019
 N. Li, D. Liu, S. Nepal, "Lightweight mutual authentication for IoT and its applications," IEEE Transactions on Sustainable Computing, vol. 2, no. 4, pp. 359-370, 2017.
[CrossRef] [Web of Science Times Cited 28] [SCOPUS Times Cited 84]
 M. Saadeh, A. Sleit, K. E. Sabri, W. Almobaideen, "Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities," Journal of Network and Computer Applications, vol. 121, pp. 1-19, 2018.
[CrossRef] [Web of Science Times Cited 19] [SCOPUS Times Cited 34]
 B. Bera, A. K. Das, W. Balzano, C. M. Medaglia, "On the design of biometric-based user authentication protocol in smart city environment," Pattern Recognition Letters, vol. 138, pp. 439-446, 2020.
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 9]
 D. Shah, V. Bharadi, "IoT based biometrics implementation on Raspberry Pi," Procedia Computer Science, vol. 79, pp. 328-336, 2016.
[CrossRef] [Web of Science Times Cited 36] [SCOPUS Times Cited 56]
 X. Sun, S. Men, C. Zhao, Z.Zhou, "A security authentication scheme in machine-to-machine home network service," Security and Communication Networks, vol. 8, no. 16, pp. 2678-2686, 2015.
[CrossRef] [Web of Science Times Cited 20] [SCOPUS Times Cited 26]
 O. Aydin, G. Dalkilic, C. Kosemen, "A novel grouping proof authentication protocol for lightweight devices: GPAPXR+," Turkish Journal of Electrical Engineering & Computer Sciences, vol. 28, no. 5, pp. 3036-3051, 2020.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 5]
 P. P. Gaikwad, J. P. Gabhane, S. S. Golait, "3-level secure Kerberos authentication for smart home systems using IoT," In 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 262-268, 2015.
[CrossRef] [SCOPUS Times Cited 24]
 A. W. Atamli, A. Martin, "Threat based security analysis for the Internet of things," International Workshop on Secure Internet of Things, pp. 35-43, 2014.
[CrossRef] [Web of Science Times Cited 79] [SCOPUS Times Cited 112]
 S. N. Firdous, Z. Baig, C. Valli, A. Ibrahim, "Modelling and evaluation of malicious attacks against the IoT MQTT protocol," In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 748-755, 2017.
[CrossRef] [Web of Science Times Cited 29] [SCOPUS Times Cited 51]
 M. H. Ozcanhan, S. Utku, "Attacking a PUF based mutual authentication protocol designed for Internet of things," International Journal of Computer Science and Software Engineering (IJCSSE), vol. 7, no. 11, pp. 270-274, 2018
 U. Cabuk, G. Kanakis, F. Dalkilic, "LTE direct as a device-to-device network technology: use cases and security," Int. J. Adv. Res. Comput. Commun. Eng. (IJARCCE), vol. 5, no. 7, pp. 401-406, 2016.
 C. T. Chen, C. C. Lee, I. C. Lin, "Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments," Plos one, vol. 15, no. 4, 2020.
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 9]
 K. N. Pallavi, V. R. Kumar, "Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment," Wireless Personal Communications, pp. 1-22, 2020.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 7]
 M. Nikooghadam, H. Amintoosi, "An improved secure authentication and key agreement scheme for healthcare applications," In 2020 25th International Computer Conference, Computer Society of Iran (CSICC), pp. 1-7, 2020.
[CrossRef] [SCOPUS Times Cited 4]
 C. C. Chang, H. D. Le, "A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks," IEEE Transactions on wireless communications, vol. 15, no. 1,pp. 357-366, 2015.
[CrossRef] [Web of Science Times Cited 196] [SCOPUS Times Cited 216]
 A. K. Das, S. Kumari, V. Odelu, X. Li, F. Wu et al., "Provably secure user authentication and key agreement scheme for wireless sensor networks," Security and Communication Networks, vol. 9, no. 16, pp. 3670-3687, 2016.
[CrossRef] [Web of Science Times Cited 58] [SCOPUS Times Cited 64]
 A. Sangwan, V. R. Singh, "A secure authentication scheme for WiMax network and verification using scyther tool," International Journal of Applied Engineering Research, vol. 12, no. 11, 3002-3008, 2017
 P. K. Panda, S. Chattopadhyay, "A modified PKM environment for the security enhancement of IEEE 802.16e," Computer Standards & Interfaces, vol. 61, pp. 107-120, 2019.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 6]
 A. K. Das, M. Wazid, N. Kumar, M. K. Khan, K. K. R. Choo et al., "Design of secure and lightweight authentication protocol for wearable devices environment," IEEE Journal of Biomedical and Health Informatics, vol. 22, no. 4, pp. 1310-1322, 2017.
[CrossRef] [Web of Science Times Cited 90] [SCOPUS Times Cited 103]
 V. Bianchi, M. Bassoli, G. Lombardo, P. Fornacciari, M. Mordonini et al., "IoT wearable sensor and deep learning: An integrated approach for personalized human activity recognition in a smart home environment," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8553-8562, 2019.
[CrossRef] [Web of Science Times Cited 93] [SCOPUS Times Cited 116]
 H. Dalkilic, M. H. Ozcanhan, H. Ozdemir, "Wireless data transfer with the use of Internet of things (IoT) technologies in smart textiles," The Journal of The Textile Institute, Published Online: 17 June 2021,
[CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 1]
 G. A. C. Montiel, F. B. Duque, L. A. P. Salazar, "BlueLock a tool to prevent Bluetooth attacks," Vision electronica, vol. 14, no. 1, 2020.
 B. Mbarek, M. Ge, T. Pitner, "An efficient mutual authentication scheme for Internet of things," Internet of Things, vol. 9, 2020.
[CrossRef] [Web of Science Times Cited 18] [SCOPUS Times Cited 21]
 D. Fang, Y. Qian, R. Q. Hu, "A flexible and efficient authentication and secure data transmission scheme for IoT applications," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3474-3484, 2020.
[CrossRef] [Web of Science Times Cited 25] [SCOPUS Times Cited 25]
 K. -H. Yeh, C. Su, K. -K. R. Choo, W. Chiu, "A novel certificateless signature scheme for smart objects in the Internet-of-things," Sensors, vol. 17, no. 5, 2017.
[CrossRef] [Web of Science Times Cited 38] [SCOPUS Times Cited 46]
 M. Y. Al-Shorman, M. M. Al-Kofahi, O. M. Al-Kofahi, "A practical microwatt-meter for electrical energy measurement in programmable devices," Measurement and Control, vol. 51, no. 9-10, pp. 383-395, 2018.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 5]
 M. H. Ozcanhan, G. Dalkilic, S. Utku, "Cryptographically supported NFC tags in medication for better inpatient safety," Journal of medical systems, vol. 38, no. 8, 2014.
[CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 8]
 T. Nandy, M. Y. I. B. Idris, R. M. Noor, M. L. M. Kiah, L. S. Lun et al., "Review on security of Internet of things authentication mechanism," IEEE Access, vol. 7, pp. 151054-151089, 2019.
[CrossRef] [Web of Science Times Cited 31] [SCOPUS Times Cited 42]
 H. Wong, T. Luo, "Man-in-the-middle attacks on MQTT-based IoT using BERT based adversarial message generation," In KDD'20 Workshops: the 3rd International Workshop on Artificial Intelligence of Things (AIoT), 2020
 N. F. Syed, Z. Baig, A. Ibrahim, C. Valli, "Denial of service attack detection through machine learning for the IoT," Journal of Information and Telecommunication, pp. 1-22, 2020.
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 20]
 E. Munivel, A. Kannammal, "New authentication scheme to secure against the phishing attack in the mobile cloud computing," Security and Communication Networks, 2019.
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 15]
 N. E. Madhoun, G. Pujolle, "A secure cloud-based NFC payment architecture for small traders," In 2016 3rd Smart Cloud Networks & Systems (SCNS), pp. 1-6, 2016.
[CrossRef] [SCOPUS Times Cited 5]
 K. Yildirim, G. Dalkilic, N. Duru, "Security analysis of Hsiang m-coupon protocol," Journal of the Faculty of Engineering and Architecture of Gazi University, vol. 34, no. 4, pp. 1705-1724, 2019.
[CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 2]
 M. Eldefrawy, I. Butun, N. Pereira, M. Gidlund, "Formal security analysis of LoRaWAN," Computer Networks, vol. 148, pp. 328-339, 2019.
[CrossRef] [Web of Science Times Cited 39] [SCOPUS Times Cited 47]
Web of Science® Citations for all references: 1,156 TCR
SCOPUS® Citations for all references: 2,662 TCR
Web of Science® Average Citations per reference: 24 ACR
SCOPUS® Average Citations per reference: 55 ACR
TCR = Total Citations for References / ACR = Average Citations per Reference
We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more
Citations for references updated on 2022-07-01 09:49 in 246 seconds.
Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.