Trending Research

Security Analysis of Two Authentication and Key Agreement Protocols Based on Multi-Server Architecture

Security Analysis of Two Authentication and Key Agreement Protocols Based on Multi-Server Architecture

This paper looks at security problems with current systems that use multiple servers and Internet-connected devices.

Authors

N V S S Prabhakar, Department of Mathematics GIS, GITAM Deemed to be University, Visakhapatnam, Andhra Pradesh, India

Surendra Talari, Department of Mathematics GIS, GITAM Deemed to be University, Visakhapatnam, Andhra Pradesh, India

Srinivas Jangirala, Associate Professor, Jindal Global Business School, O.P. Jindal Global University, Sonipat, Haryana, India

Prasad Vangapa, Department of Mathematics GIS, GITAM Deemed to be University, Visakhapatnam, Andhra Pradesh, India

Summary

This paper delves into the critical security and privacy challenges associated with the integration of Multi-Server architecture with IoT devices to enhance authentication solutions. Our focus revolves around the examination of protocols proposed by Kumar and Om and Haq et al. Through an in-depth cryptanalysis of these schemes, we uncover vulnerabilities and limitations, elucidating their susceptibility to various security failures.

Kumar and Om’s scheme is revealed to be susceptible to issues such as incorrect login features, vulnerability to traceability attacks, and a lack of forward secrecy, along with the potential leakage of temporary information. In the case of Haq et al.’s scheme, identified weaknesses include compromises in user privacy and susceptibility to key compromise impersonation attacks.

The paper underscores the paramount importance of mutual authentication between users and application servers, coupled with the negotiation of session keys to thwart key compromise impersonation attacks. In light of these findings, the paper advocates for the development of a novel, efficient, and secure multi-server authenticated key agreement scheme. Such a scheme should not only address existing security concerns but also be adaptable to diverse environments, including multi-application server scenarios and practical applications such as the Internet of Things, medical IoT, and smart homes.

Published in: 2024 4th International Conference on Intelligent Technologies (CONIT)

To read the full article, please click here.