A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security

被引:2
作者
Attkan, Ankit [1 ]
Ranga, Virender [2 ]
Ahlawat, Priyanka [1 ]
机构
[1] NIT Kurukshetra, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[2] Delhi Technol Univ, Dept Informat Technol, Delhi 110042, India
来源
ACM TRANSACTIONS ON INTERNET OF THINGS | 2023年 / 4卷 / 02期
关键词
Rubik's Cube Cryptosystem; mutual authentication; Internet of Things; secret session keys; session key randomizer; Blockchain; token (zvma); Cyber-security; IoT security; data privacy; chaotic maps; image encryption-decryption; number theory; RCC-Block-MASSK model; light-weight; INTERNET; LIGHTWEIGHT; PROOF; MANAGEMENT; CONSENSUS; THINGS;
D O I
10.1145/3586578
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any highend security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.
引用
收藏
页数:39
相关论文
共 86 条
[1]   An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices [J].
Abed, Sa'ed ;
Jaffal, Reem ;
Mohd, Bassam J. ;
Al-Shayeji, Mohammad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04) :3065-3084
[2]   Lightweight and DoS Resistant Multiuser Authentication in Wireless Sensor Networks for Smart Grid Environments [J].
Afianti, Farah .
IEEE ACCESS, 2019, 7 :67107-67122
[3]  
Agiollo A., 2021, IEEE T NETW SERV MAN, V18, P1178, DOI DOI 10.1109/TNSM.2021.3075496
[4]   Solving the Rubik's cube with deep reinforcement learning and search [J].
Agostinelli, Forest ;
McAleer, Stephen ;
Shmakov, Alexander ;
Baldi, Pierre .
NATURE MACHINE INTELLIGENCE, 2019, 1 (08) :356-363
[5]  
Alam Md Eftekhar, 2021, 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), P649, DOI 10.1109/ICREST51555.2021.9331104
[6]   Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA) [J].
Alhejazi, Manal Mohamed ;
Mohammad, Rami Mustafa A. .
INFORMATION SECURITY JOURNAL, 2022, 31 (02) :125-143
[7]   A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets [J].
Alhijawi, Bushra ;
Almajali, Sufyan ;
Elgala, Hany ;
Salameh, Haythem Bany ;
Ayyash, Moussa .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
[8]  
AlJoboury IM., 2020, INT J INFORM VISUALI, V4, P123
[9]   EPPDA: An Efficient and Privacy-Preserving Data Aggregation Scheme with Authentication and Authorization for IoT-Based Healthcare Applications [J].
Almalki, Faris A. ;
Soufiene, Ben Othman .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[10]  
[Anonymous], 2008, SIGCOMM Demonstr