A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

被引:4
作者
Roy, Kumar Sekhar [1 ]
Deb, Subhrajyoti [2 ]
Kalita, Hemanta Kumar [3 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol Bengaluru, Dept Comp Sci & Engn, Manipal 576104, Karnataka, India
[2] ICFAI Univ, Dept Comp Sci & Engn, Agartala 799210, India
[3] Cent Inst Technol, Dept Comp Sci & Engn, Kokrajhar 783370, India
关键词
Internet of things; Authentication; Post-quantum cryptography; Lattice-based cryptography; Cloud computing; Fog computing; Fail-safe; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; SECURITY; INTERNET; EFFICIENT;
D O I
10.1016/j.dcan.2022.12.003
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus has been given to securing such devices. As these devices are constrained in numerous aspects, it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all. We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016. Therefore we propose a lightweight authentication protocol to provide proper access to such devices. We have considered several aspects while designing our authentication protocol, such as scalability, movement, user registration, device registration, etc. To define the architecture we used a three-layered model consisting of cloud, fog, and edge devices. We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage. We also provide a fail-safe mechanism for a situation where an authenticating server might fail, and the deployed IoT devices can self-organize to keep providing services with no human intervention. We find that our protocol works the fastest when using ring learning with errors. We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool. In conclusion, we propose a safe, hybrid, and fast authentication protocol for authenticating IoT devices in a fog computing environment.
引用
收藏
页码:989 / 1000
页数:12
相关论文
共 56 条
  • [1] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
  • [2] Alkim Erdem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P332, DOI 10.1007/978-3-319-49445-6_19
  • [3] A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
    Amin, Ruhul
    Kumar, Neeraj
    Biswas, G. P.
    Iqbal, R.
    Chang, Victor
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 1005 - 1019
  • [4] NTRU Prime: Reducing Attack Surface at Low Cost
    Bernstein, Daniel J.
    Chuengsatiansup, Chitchanok
    Lange, Tanja
    van Vredendaal, Christine
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 235 - 260
  • [5] Bestavros A., 2004, SEP STABLE ELECTION
  • [6] Bonomi F.., 2012, P 1 EDITION MCC WORK, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
  • [7] Buchmann J., 2016, Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security - IoTPTS'16, (Xi'an, China), P2
  • [8] A Novel NTRU-Based Handover Authentication Scheme for Wireless Networks
    Chen, Rui
    Peng, Dezhong
    [J]. IEEE COMMUNICATIONS LETTERS, 2018, 22 (03) : 586 - 589
  • [9] An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
    Chuang, Ming-Chin
    Chen, Meng Chang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1411 - 1418
  • [10] Coppersmith D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P52