Indonesian Journal of Electrical Engineering and Computer Science
Vol 24, No 1: October 2021

Formal security analysis of lightweight authenticated key agreement protocol for IoT in cloud computing

Ahmed H. Aly (Helwan University)
Atef Ghalwash (Helwan University)
Mona M. Nasr (Helwan University)
Ahmed A. Abd-El Hafez (National Telecom. Regulatory Authority (NTRA))



Article Info

Publish Date
01 Oct 2021

Abstract

TheĀ internet of things (IoT) and cloud computing are evolving technologies in the information technology field. Merging the pervasive IoT technology with cloud computing is an innovative solution for better analytics and decision-making. Deployed IoT devices offload different types of data to the cloud, while cloud computing converges the infrastructure, links up the servers, analyzes information obtained from the IoT devices, reinforces processing power, and offers huge storage capacity. However, this merging is prone to various cyber threats that affect the IoT-Cloud environment. Mutual authentication is considered as the forefront mechanism for cyber-attacks as the IoT-Cloud participants have to ensure the authenticity of each other and generate a session key for securing the exchanged traffic. While designing these mechanisms, the constrained nature of the IoT devices must be taken into consideration. We proposed a novel lightweight protocol (Light-AHAKA) for authenticating IoT-Cloud elements and establishing a key agreement for encrypting the exchanged sensitive data was proposed. In this paper, the formal verification of (Light-AHAKA) was presented to prove and verify the correctness of our proposed protocol to ensure that the protocol is free from design flaws before the deployment phase. The verification is performed based on two different approaches, the strand space model and the automated validation of internet security protocols and applications (AVISPA) tool.

Copyrights © 2021