Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, effi...

Full description

Saved in:
Bibliographic Details
Main Authors: Kisung Park, Myeonghyun Kim, Youngho Park
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/25/1/237
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841548939581456384
author Kisung Park
Myeonghyun Kim
Youngho Park
author_facet Kisung Park
Myeonghyun Kim
Youngho Park
author_sort Kisung Park
collection DOAJ
description The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. The previous work in “Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT” proposed a novel AKA scheme for secure IoT environments. They claimed their protocol offers comprehensive security features, guarding against numerous potential flaws while achieving session key security. However, this paper demonstrates through logical and mathematical analyses that the previous work is vulnerable to various attacks. We conducted a security analysis using the extended Canetti and Krawczyk (eCK) model, which is widely employed in security evaluations. This model considers scenarios where an attacker has complete control over the network, including the ability to intercept, modify, and delete messages, while also accounting for the potential exposure of ephemeral private keys. Furthermore, we show that their scheme fails to meet critical security requirements and relies on flawed security assumptions. We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments.
format Article
id doaj-art-a650829ee2314586bc1b5e8f88be7948
institution Kabale University
issn 1424-8220
language English
publishDate 2025-01-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj-art-a650829ee2314586bc1b5e8f88be79482025-01-10T13:21:19ZengMDPI AGSensors1424-82202025-01-0125123710.3390/s25010237Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoTKisung Park0Myeonghyun Kim1Youngho Park2Department of Computer Engineering (Smart Security), Gachon University, Seongnam 13120, Republic of KoreaSystem Security Research Section, Electronics and Telecommunications Research Institute, Daejeon 34129, Republic of KoreaSchool of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of KoreaThe proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. The previous work in “Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT” proposed a novel AKA scheme for secure IoT environments. They claimed their protocol offers comprehensive security features, guarding against numerous potential flaws while achieving session key security. However, this paper demonstrates through logical and mathematical analyses that the previous work is vulnerable to various attacks. We conducted a security analysis using the extended Canetti and Krawczyk (eCK) model, which is widely employed in security evaluations. This model considers scenarios where an attacker has complete control over the network, including the ability to intercept, modify, and delete messages, while also accounting for the potential exposure of ephemeral private keys. Furthermore, we show that their scheme fails to meet critical security requirements and relies on flawed security assumptions. We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments.https://www.mdpi.com/1424-8220/25/1/237security analysisInternet of Thingssecurity attackssession key security
spellingShingle Kisung Park
Myeonghyun Kim
Youngho Park
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Sensors
security analysis
Internet of Things
security attacks
session key security
title Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
title_full Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
title_fullStr Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
title_full_unstemmed Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
title_short Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
title_sort security evaluation of provably secure ecc based anonymous authentication and key agreement scheme for iot
topic security analysis
Internet of Things
security attacks
session key security
url https://www.mdpi.com/1424-8220/25/1/237
work_keys_str_mv AT kisungpark securityevaluationofprovablysecureeccbasedanonymousauthenticationandkeyagreementschemeforiot
AT myeonghyunkim securityevaluationofprovablysecureeccbasedanonymousauthenticationandkeyagreementschemeforiot
AT younghopark securityevaluationofprovablysecureeccbasedanonymousauthenticationandkeyagreementschemeforiot