A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications

被引:14
作者
Chen, Fei [1 ]
Xiao, Zixing [1 ]
Xiang, Tao [2 ]
Fan, Junfeng [3 ]
Truong, Hong-Linh [4 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Open Secur Res, Shenzhen 518000, Guangdong, Peoples R China
[4] Aalto Univ, Sch Sci, Dept Comp Sci, FI-02150 Espoo, Finland
基金
中国国家自然科学基金;
关键词
Internet of Things; Authentication; Servers; Security; Mobile applications; Bridges; Relays; formal verification; lifecycle management; scalability; smart IoT application; SECURITY; INTERNET; THINGS;
D O I
10.1109/TDSC.2022.3178115
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of IoT (Internet of Things) brings great convenience to people through the utilization of IoT applications, but also brings huge security challenges. Existing IoT security breaches show that many IoT devices have authentication flaws. Although many IoT authentication schemes were proposed, they are not fit for recent smart IoT applications covering IoT device, back-end sever, and user-end mobile applications. To build the first line of defense for smart IoT systems, this paper proposes a new authentication scheme. The proposed scheme first models the entire lifecycle of the IoT device authentication for real-world scenarios of smart IoT systems that contains factory manufacturing, daily usage, and system resetting. For each stage in the lifecycle, the proposed scheme employs efficient symmetric key mechanisms to achieve the authentication between IoT device, back-end server, and mobile application. The proposed scheme supports both server-free local area network communication and sever-involved remote public area communication. Formal security verification shows that the proposed scheme resists existing attacks. The open-source experimental evaluations also show that the proposed scheme is efficient and promising for practical usage.
引用
收藏
页码:2221 / 2237
页数:17
相关论文
共 45 条
[1]   Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems [J].
AL-Turjman, Fadi ;
Deebak, B. D. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2919-2927
[2]  
Aman M.N., 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference, P1
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]  
Ashibani Y K., 2017, IEEE Publications. 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), P1, DOI DOI 10.1109/CCECE.2017.7946657
[5]  
Ashibani Y, 2018, 2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), P632, DOI 10.1109/IEMCON.2018.8614892
[6]   Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy [J].
Avoine, Gildas ;
Canard, Sebastien ;
Ferreira, Loic .
TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 :199-224
[7]   The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs [J].
Becker, Georg T. .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :535-555
[8]  
Capossele A, 2015, IEEE ICC, P549, DOI 10.1109/ICC.2015.7248379
[9]   Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database [J].
Chatterjee, Urbi ;
Govindan, Vidya ;
Sadhukhan, Rajat ;
Mukhopadhyay, Debdeep ;
Chakraborty, Rajat Subhra ;
Mahata, Debashis ;
Prabhu, Mukesh M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) :424-437
[10]   IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios [J].
Cirani, Simone ;
Picone, Marco ;
Gonizzi, Pietro ;
Veltri, Luca ;
Ferrari, Gianluigi .
IEEE SENSORS JOURNAL, 2015, 15 (02) :1224-1234