A Lightweight and Secure Communication Protocol for the IoT Environment

被引:2
作者
Ding, Zikang [1 ,2 ]
He, Daojing [2 ]
Qiao, Qi [1 ]
Li, Xuru [1 ]
Gao, Yun [1 ]
Chan, Sammy [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] East China Normal Univ, Software Engn Inst, Shanghai 200062, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[3] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Protocols; Internet of Things; Synchronization; Security; Generators; Logistics; Encryption; network security; secure communication protocol; PROVABLY SECURE; AUTHENTICATION; INTERNET; SCHEME;
D O I
10.1109/TDSC.2023.3267979
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring secure communications for the Internet of Things (IoT) systems remains a challenge. Due to exacting resource limitations of computing, memory, and communication in IoT environments, communication schemes based on asymmetric cryptographic systems can be challenging to deploy. An alternative is to deploy symmetric encryption schemes based on pre-shared keys. However, there are also challenges in designing such schemes and examples include how to achieve an optimal trade-off between security and performance levels while meeting resource consumption requirements, especially when adding some of these devices to the blockchain. Hence, this paper presents a lightweight key synchronization update algorithm, which is then used as a building block in our proposed lightweight secure communication protocol. The security of the protocol is analyzed to show that it can resist common attacks, such as replay attacks, and man-in-the-middle attacks. We then use Tamarin, a widely accepted security protocol verification tool, for formal verification. In addition, we evaluate the randomness and computational performance of the lightweight key synchronization update algorithm and demonstrate that it outperforms other schemes. We also evaluate the performance of the protocol, in terms of computational and communication costs, to demonstrate utility.
引用
收藏
页码:1050 / 1067
页数:18
相关论文
共 56 条
[1]   Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision [J].
Abbasinezhad-Mood, Dariush ;
Mazinani, Sayyed Majid ;
Nikooghadam, Morteza ;
Ostad-Sharif, Arezou .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1227-1238
[2]  
Alfardan Nadem., 2013, USENIX Security
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]   Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm [J].
Baldanzi, Luca ;
Crocetti, Luca ;
Falaschi, Francesco ;
Bertolucci, Matteo ;
Belli, Jacopo ;
Fanucci, Luca ;
Saponara, Sergio .
SENSORS, 2020, 20 (07)
[5]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752
[6]   Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2019, 7 :85627-85644
[7]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1976, P1
[8]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[9]  
De Cannière C, 2008, LECT NOTES COMPUT SC, V4986, P244
[10]   Secure and Fast Encryption (SAFE) with Classical Random Number Generators [J].
Deng, Lih-Yuan ;
Shiau, Jyh-Jen Horng ;
Lu, Henry Horng-Shing ;
Bowman, Dale .
ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 2018, 44 (04)