On the Resilience of Authentication Schemes in IoT Networks With Different Structural Topologies

被引:1
作者
Lau, Chi Ho [1 ]
Yan, Fan [2 ]
Chan, Sammy [1 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[2] Hong Kong Metropolitan Univ, Sch Sci & Technol, Hong Kong, Peoples R China
关键词
Authentication; Internet of Things; Network topology; Security; Topology; Resilience; Blockchains; IoT security; blockchain; authentication; complex network; SECURITY; INTERNET;
D O I
10.1109/TCE.2023.3332133
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The concern of network security is one of the major factors preventing the development of IoT-based applications. Such security risks can be mitigated by adopting a proper authentication scheme. The lack of quantitative comparison increases the difficulty when choosing the authentication scheme. This paper presents an empirical study of the effectiveness of three authentication methods including the blockchain-based method, a newly joined competitor. This study does not solely focus on the scheme level security but also five common structural topologies in IoT networks. We conduct simulations of these topological networks under six attack strategies and evaluate their survival sizes and survival link ratios. The network vulnerability coefficient is also proposed to illustrate a network's expected exploit rate providing quantitative results to compare among schemes. The blockchain-based method achieves a 57.68% to 225.28% improvement compared to a defenseless network and outperforms other traditional schemes in BA, NSW and GRID structured networks. The results indicate that the network topology can greatly affect the resilience of an authentication scheme.
引用
收藏
页码:389 / 400
页数:12
相关论文
共 26 条
  • [1] Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN)
    Al Hayajneh, Abdullah
    Bhuiyan, Md Zakirul Alam
    McAndrew, Ian
    [J]. COMPUTERS, 2020, 9 (01)
  • [2] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [3] Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model
    Amanlou, Sanaz
    Hasan, Mohammad Kamrul
    Abu Bakar, Khairul Azmi
    [J]. COMPUTER NETWORKS, 2021, 199
  • [4] Advanced Service Search Model for Higher Network Navigation Using Small World Networks
    Amin, Farhan
    Choi, Gyu Sang
    [J]. IEEE ACCESS, 2021, 9 : 70584 - 70595
  • [5] The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
    Bonneau, Joseph
    Herley, Cormac
    van Oorschot, Paul C.
    Stajano, Frank
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 553 - 567
  • [6] Enhanced Authentication Protocol for the Internet of Things Environment
    Chen, Chien-Ming
    Li, Xuanang
    Liu, Shuangshuang
    Wu, Mu-En
    Kumari, Saru
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [7] De Masi G., 2018, PROC ADV SCI ENG TE, P1
  • [8] A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things
    Ding, Xuyang
    Wang, Xiaoxiang
    Xie, Ying
    Li, Fagen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (03) : 1818 - 1829
  • [9] Kurosawa-Desmedt Meets Tight Security
    Gay, Romain
    Hofheinz, Dennis
    Kohl, Lisa
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 133 - 160
  • [10] Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
    Hammi, Mohamed Tahar
    Hammi, Badis
    Bellot, Patrick
    Serhrouchni, Ahmed
    [J]. COMPUTERS & SECURITY, 2018, 78 : 126 - 142