Yazar "Barnawi, Ahmed" seçeneğine göre listele
Listeleniyor 1 - 6 / 6
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020) Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Barnawi, Ahmed; Al-Barakati, Abdullah; Shon, TaeshikTwo party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows-Abadi-Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments.Öğe ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment(SPRINGER HEIDELBERG, TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY, 2020) Alzahrani, Bander A.; Chaudhry, Shehzad Ashraf; Barnawi, Ahmed; Xiao, Wenjing; Chen, Min; Al-Barakati, AbdullahIn 2019, Banerjee et al. (IEEE Int Things J 6(5):8739-8752, 2019; 10.1109/JIOT.2019.2931372) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a user and a smart device for IoT based networks. As per their claim, the scheme of Banerjee et al. provides known security features and resist all known attacks using only lightweight symmetric key primitives. The analysis in this paper; however, shows that the scheme of Banerjee et al. cannot complete normally. The user in their scheme, after sending a request message may never receive the response from smart device. This incorrectness results into total in applicability of Banerjee et al.'s scheme. Moreover, it is also shown that their scheme has weaknesses against stolen verifier attack. Then an improved lightweight authentication scheme for IoT deployments (ILAS-IoT) is proposed in this article. ILAS-IoT performs the process correctly by increasing very little computation and communication overheads. The proposed ILAS-IoT also resists stolen verifier and all known attacks, which is evident from the formal and informal security analysis.Öğe A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022) Khan, Muhammad Asghar; Alzahrani, Bander A.; Barnawi, Ahmed; Al-Barakati, Abdullah; Irshad, Azeem; Chaudhry, Shehzad AshrafRecently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has gained attention as marine operations have increased substantially. Using modern information network technologies and integrating space, air, ground, and sea network segments, MCN may be able to offer worldwide coverage and diverse Quality-of-Service (QoS) provisioning. These network segments are expected to provide not only traditional communication services, but also processing, caching, sensing, and control capabilities when linked via Sixth Generation (6G) mobile networks. However, this development in infrastructure growth is subjected to new security and privacy concerns due to open links, moving nodes, and diverse collaborative algorithms. In this paper, we propose an improved and resource friendly authentication scheme for the space– air–ground–sea integrated maritime communication network using Elliptic Curve Cryptography (ECC). To validate the security hardness of the proposed scheme, formal security assessment method such as Random Oracle Model (ROM) is used. Finally, comparisons with relevant authentication schemes are provided in terms of computation and communication costs. The findings support the viability of the proposed scheme.Öğe A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems(Hindawi Limited, 2021) Alzahrani, Bander A.; Barnawi, Ahmed; Chaudhry, Shehzad AshrafAs a part of the smart city revolution, crowd management is an emerging trend and it can enhance the quality of life. Unmanned ariel vehicles (UAVs) can help in making the crowd management process more efficient and more accurate. UAVs can monitor and collect environmental-related surveillance data and share real-time information with each other and with the decision makers. However, the battery-operated UAVs communicate over the open public channel making the privacy and security of the UAVs a crucial element in mission-critical applications. The weaknesses of the existing scheme pave the way to design a new lightweight authentication scheme for UAV environments. In this article, we present a symmetric key primitive-based scheme and provide authentication among a user and a UAV through an intermediate control center. Due to usage of symmetric key and elliptic curve cryptography, the proposed scheme fulfils the performance requirements of the UAVs. The security of the proposed scheme is substantiated through BAN logic, along with a discussion on security features extended by the proposed scheme. The performance and security comparisons show that the proposed scheme provides adequate security and efficiency and can be practically deployed in real UAV environments. © 2021 Bander A. Alzahrani et al.Öğe SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022) Alzahrani, Bander A.; Barnawi, Ahmed; Albarakati, Abdullah; Irshad, Azeem; Khan, Muhammad Asghar; Chaudhry, Shehzad AshrafBeing one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the environment including the users to transform daily life seamlessly enjoyable and easy. However, owing to the public communication infrastructure, the advantages of SH are subject to security and privacy issues. Recently, Yu et al. presented a privacy and security solution for SH environment. The scheme of Yu et al. is based on lightweight symmetric key functions. Although the scheme of Yu et al. exhibits the lightweight property, it is proven in this paper that their scheme cannot provide mutual authentication due to a crucial design fault. An improved scheme using symmetric key functions for SH (SKIA-SH) is proposed in this paper. The security of the proposed scheme is furnished through formal BAN logic followed by brief discussion on security attribute provision of the proposed SKIA-SH. The comparisons show that the proposed SKIA-SH provides the required security on the cost of slight increase in computation and communication costs. The simulation results show that the SKIA-SH completes an authentication round by exchanging 216 bytes in just 5.34 ms.Öğe TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021) Ali, Zeeshan; Alzahrani, Bander A.; Barnawi, Ahmed; Al-Barakati, Abdullah; Vijayakumar, Pandi; Chaudhry, Shehzad AshrafIn smart cities, common infrastructures are merged and integrated with various components of information communication and technology (ICT) to be coordinated and controlled. Drones (unmanned aerial vehicles) are amongst those components, and when coordinated with each other and with the environment, the drones form an Internet of Drones (IoD). +e IoD provides real-time data to the users in smart cities by utilizing traditional cellular networks. However, the delicate data gathered by drones are subject to many security threats and give rise to numerous privacy and security issues. A robust and secure authentication scheme is required to allow drones and users to authenticate and establish a session key. In this article, we proposed a provably secure symmetric-key and temporal credential-based lightweight authentication protocol (TC-PSLAP) to secure the drone communication. We prove that the proposed scheme is provably secure formally through the automated verification tool AVISPA and Burrows–Abadi–Needham logic (BAN logic). Informal security analysis is also performed to depict that the proposed TC-PSLAP can resist known attacks.