An Authentication Mechanism Based on Zero Trust With Radio Frequency Fingerprint for Internet of Things Networks

被引:2
作者
Jing, Wentao [1 ]
Peng, Linning [1 ,2 ]
Fu, Hua [1 ,2 ]
Hu, Aiqun [2 ,3 ]
机构
[1] Southeast Univ, Sch Cyber Sci Engn, Nanjing 210096, Peoples R China
[2] Purple Mt Labs Network Commun & Secur, Nanjing 210096, Peoples R China
[3] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 13期
基金
中国国家自然科学基金;
关键词
Authentication; cyber security; Internet of Things (IoT); IoT security; radio frequency fingerprint (RFF); zero trust; IDENTIFICATION;
D O I
10.1109/JIOT.2024.3385989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Internet of Things (IoT) and cloud networks, the security of edge networks, borderless networks, and obscure networks are essential, so there are many security problems that need to be tackled, including over-trust in trust areas and security only based on security boundaries in traditional security architecture. According to characters of zero trust security architectures and integrative trust model (ITM), the zero trust architectures (ZTAs) better adapt to handle these security problems compared to the ITM for the IoT networks. Meanwhile, the radio frequency fingerprint (RFF) identification keeps high accuracy and high stability with researchers' investigation, which makes RFF authentication feasible. Therefore, we propose a mechanism that combines the RFF authentication technique and ZTA to improve security in IOT networks, including edge networks, borderless networks, and obscure networks. The method resolves the difficulty of over-reliance on a trustable center or trust chain, and the method is suitable for borderless networks and obscure networks. Besides, this method resists data leakage, counterfeit attack and rouge access point (AP) attack with RFF authentication, and it can reduce the risk caused by compromised devices with zero trust concepts. With the analysis in this article, the proposed method keeps high-level security and performance that method effectively against spoofing identity, tampering, and information disclosure. The authentication accuracy of the method has reached 99%, and the authentication owns robustness in time cost and collision-resistant.
引用
收藏
页码:23683 / 23698
页数:16
相关论文
共 43 条
[1]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[2]   Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited [J].
Arat, Ferhat ;
Akleylek, Sedat .
COMPUTERS & SECURITY, 2023, 128
[3]   An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions [J].
Bang, Ankur O. ;
Rao, Udai Pratap ;
Visconti, Andrea ;
Brighente, Alessandro ;
Conti, Mauro .
COMPUTERS & SECURITY, 2022, 123
[4]   Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives [J].
Bello, Auwal Ahmed ;
Chiroma, Haruna ;
Gital, Abdulsalam Ya'u ;
Gabralla, Lubna A. ;
Abdulhamid, Shafi'i M. ;
Shuib, Liyana .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (17) :13651-13678
[5]   Wireless Device Identification with Radiometric Signatures [J].
Brik, Vladimir ;
Banerjee, Suman ;
Gruteser, Marco ;
Oh, Sangho .
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, :116-+
[6]   Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust [J].
Chen, Lu ;
Dai, Zaojian ;
Chen, Mu ;
Li, Nige .
2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, :65-68
[7]  
CHOE HC, 1995, P SOC PHOTO-OPT INS, V2491, P504, DOI 10.1117/12.205415
[8]  
Costin A, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P95
[9]  
Danev B, 2009, P USENIX SEC S, P199
[10]  
Hall J., 2004, Commun. Internet Inf. Technol., V1, P1