A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

被引:4
作者
Roy, Kumar Sekhar [1 ]
Deb, Subhrajyoti [2 ]
Kalita, Hemanta Kumar [3 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol Bengaluru, Dept Comp Sci & Engn, Manipal 576104, Karnataka, India
[2] ICFAI Univ, Dept Comp Sci & Engn, Agartala 799210, India
[3] Cent Inst Technol, Dept Comp Sci & Engn, Kokrajhar 783370, India
关键词
Internet of things; Authentication; Post-quantum cryptography; Lattice-based cryptography; Cloud computing; Fog computing; Fail-safe; 2-FACTOR USER AUTHENTICATION; KEY AGREEMENT SCHEME; SECURITY; INTERNET; EFFICIENT;
D O I
10.1016/j.dcan.2022.12.003
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus has been given to securing such devices. As these devices are constrained in numerous aspects, it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all. We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016. Therefore we propose a lightweight authentication protocol to provide proper access to such devices. We have considered several aspects while designing our authentication protocol, such as scalability, movement, user registration, device registration, etc. To define the architecture we used a three-layered model consisting of cloud, fog, and edge devices. We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage. We also provide a fail-safe mechanism for a situation where an authenticating server might fail, and the deployed IoT devices can self-organize to keep providing services with no human intervention. We find that our protocol works the fastest when using ring learning with errors. We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool. In conclusion, we propose a safe, hybrid, and fast authentication protocol for authenticating IoT devices in a fog computing environment.
引用
收藏
页码:989 / 1000
页数:12
相关论文
共 56 条
  • [31] On Ideal Lattices and Learning with Errors over Rings
    Lyubashevsky, Vadim
    Peikert, Chris
    Regev, Oded
    [J]. JOURNAL OF THE ACM, 2013, 60 (06)
  • [32] McEliece RJ., 1978, CODING THV, V4244, P114
  • [33] Deadline-Aware Fair Scheduling for Offloaded Tasks in Fog Computing With Inter-Fog Dependency
    Mukherjee, Mithun
    Guo, Mian
    Lloret, Jaime
    Iqbal, Razi
    Zhang, Qi
    [J]. IEEE COMMUNICATIONS LETTERS, 2020, 24 (02) : 307 - 311
  • [34] NIST, 2017, Report on Post-Quantum Cryptography
  • [35] On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
    Regev, Oded
    [J]. JOURNAL OF THE ACM, 2009, 56 (06)
  • [36] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
  • [37] Roy K. S., 2019, Int. J. Appl. Eng. Res., V14, P2608
  • [38] Roy KS, 2019, INT J NEXT-GENER COM, V10, P178
  • [39] Sadek Rowayda A., 2018, Future Computing and Informatics Journal, V3, P166, DOI 10.1016/j.fcij.2018.02.003
  • [40] Schmitt C., 2016, Internet of Things, P239