Treffer: An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol.

Title:
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol.
Authors:
Wu Y; School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China., Feng T; School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China.
Source:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Sep 05; Vol. 22 (17). Date of Electronic Publication: 2022 Sep 05.
Publication Type:
Journal Article
Language:
English
Journal Info:
Publisher: MDPI Country of Publication: Switzerland NLM ID: 101204366 Publication Model: Electronic Cited Medium: Internet ISSN: 1424-8220 (Electronic) Linking ISSN: 14248220 NLM ISO Abbreviation: Sensors (Basel) Subsets: MEDLINE
Imprint Name(s):
Original Publication: Basel, Switzerland : MDPI, c2000-
References:
Sensors (Basel). 2018 Jun 05;18(6):. (PMID: 29874839)
Sensors (Basel). 2018 Jun 08;18(6):. (PMID: 29890704)
Sensors (Basel). 2020 Feb 22;20(4):. (PMID: 32098448)
Sensors (Basel). 2021 Aug 30;21(17):. (PMID: 34502729)
Grant Information:
61762060 National Natural Science Foundation of China; 20YF3GA016 Foundation for the Key Research and Development Program of Gansu Province, China
Contributed Indexing:
Keywords: Dolev–Yao attacker model; EnOcean protocol; colored Petri net; smart lighting control
Entry Date(s):
Date Created: 20220909 Date Completed: 20220912 Latest Revision: 20220913
Update Code:
20250114
PubMed Central ID:
PMC9460674
DOI:
10.3390/s22176713
PMID:
36081172
Database:
MEDLINE

Weitere Informationen

EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitted between sensors in smart lighting control systems is easily accessible by malicious attackers, attackers can analyze users' habits based on the intercepted information. This paper analyzed the security of the EnOcean protocol using a formal analysis method based on the colored Petri net (CPN) theory and the Dolev-Yao attacker model and found that the protocol did not anonymize the device identity information and did not have a communication key update mechanism, so an attacker could easily initiate a key compromise impersonation attack (KCIA) after breaking the pre-shared communication key. To address the above security issues, this paper proposed an EnOcean-A protocol with higher security based on the EnOcean protocol. The EnOcean-A protocol introduced a trusted third-party server to send communication keys to communication devices because devices must obtain different communication keys from the trusted third-party server each time they communicated. Thus, this protocol could resist a KCIA and achieve forward security. Meanwhile, the device identity information was anonymized using a homomorphic hash function in the EnOcean-A protocol, and the dynamic update mechanism of the device identity information was added so that an attacker could not obtain the real identity information of the device. Finally, the formal analysis of the EnOcean-A protocol showed that the new protocol could resist a KCIA and ensure the anonymity and untraceability of the communication device, which had higher security compared with the EnOcean protocol.