A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

被引:1
作者
Al-Otaibi, Shaha [1 ]
Khan, Rahim [2 ]
Ali, Hashim [2 ]
Khan, Aftab Ahmed [2 ]
Saeed, Amir [3 ]
Ali, Jehad [4 ]
机构
[1] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] Abdul Wali Khan Univ Mardan, Dept Comp Sci, Mardan 23200, Pakistan
[3] UET Peshawar, Dept Comp Sci & IT, Jalozai Campus Peshawar, Peshawar 24240, Pakistan
[4] Ajou Univ, Dept AI Convergence Network, Suwon 16499, South Korea
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 78卷 / 03期
关键词
Internet of things; authenticity; security; location; communication; USER AUTHENTICATION; KEY AGREEMENT; SCHEME; AODV;
D O I
10.32604/cmc.2024.049017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device's authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field -proven methodologies were presented to streamline the verification process of the communicating devices; however, location -aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where devices are mobile. This paper presents a lightweight and location -aware device -toserver authentication technique where the device's membership with the nearest server is subjected to its location information along with other measures. Initially, Media Access Control (MAC) address and Advance Encryption Scheme (AES) along with a secret shared key, i.e., lambda i of 128 bits, have been utilized by Trusted Authority (TA) to generate MaskIDs, which are used instead of the original ID, for every device, i.e., server and member, and are shared in the offline phase. Secondly, TA shares a list of authentic devices, i.e., server Sj and members Ci, with every device in the IoT for the onward verification process, which is required to be executed before the initialization of the actual communication process. Additionally, every device should be located such that it lies within the coverage area of a server, and this location information is used in the authentication process. A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks, i.e., man -in -the -middle, masquerading, device, and server impersonations, etc., especially in the IoT domain. Moreover, proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance, particularly in terms of various evaluation metrics, i.e., processing, communication, and storage overheads. These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches, preferably in terms of communication, storage, and processing costs.
引用
收藏
页码:3805 / 3823
页数:19
相关论文
共 28 条
[1]  
Abdelshafy MA, 2014, LECT NOTES COMPUT SC, V8487, P318
[2]   Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model [J].
Amanlou, Sanaz ;
Hasan, Mohammad Kamrul ;
Abu Bakar, Khairul Azmi .
COMPUTER NETWORKS, 2021, 199
[3]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[4]   A lightweight and compromise-resilient authentication scheme for IoTs [J].
Aziz, Muhammad Faisal ;
Khan, Abdul Nasir ;
Shuja, Junaid ;
Khan, Iftikhar Ahmed ;
Khan, Fiaz Gul ;
Khan, Atta Ur Rehman .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[5]   Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond ;
Park, YoungHo .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) :1310-1322
[6]   Artificially Intelligent Electronic Money [J].
Fragkos G. ;
Minwalla C. ;
Plusquellic J. ;
Tsiropoulou E.E. .
IEEE Consumer Electronics Magazine, 2021, 10 (04) :81-89
[7]   LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things [J].
Gong, Bei ;
Zheng, Guiping ;
Waqas, Muhammad ;
Tu, Shanshan ;
Chen, Sheng .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) :12590-12602
[8]   A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (11) :7124-7132
[9]   A lightweight anonymous user authentication and key establishment scheme for wearable devices [J].
Gupta, Ankur ;
Tripathi, Meenakshi ;
Shaikh, Tabish Jamil ;
Sharma, Aakar .
COMPUTER NETWORKS, 2019, 149 :29-42
[10]  
Hajny J, 2020, INT C ULTRA MOD TELE, P87, DOI [10.1109/ICUMT51630.2020.9222243, 10.1109/icumt51630.2020.9222243]