SUACC-IoT: secure unified authentication and access control system based on capability for IoT

被引:7
|
作者
Sivaselvan, N. [1 ,2 ]
Bhat, K. Vivekananda [2 ,3 ]
Rajarajan, Muttukrishnan [1 ]
Das, Ashok Kumar [4 ]
Rodrigues, Joel J. P. C. [5 ,6 ]
机构
[1] City Univ London, Dept Elect & Elect Engn, London, England
[2] Manipal Acad Higher Educ, Manipal Inst Technol, Dept Comp Sci & Engn, Manipal 576104, India
[3] Manipal Acad Higher Educ, Ctr Cryptog, Manipal Inst Technol, Manipal 576104, India
[4] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[5] China Univ Petr East China, Coll Comp Sci & Technol, Qingdao 266555, Peoples R China
[6] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2023年 / 26卷 / 04期
关键词
Internet of Things (IoT); Authentication; Access control; Capability; Security; EFFICIENT; SCHEME;
D O I
10.1007/s10586-022-03733-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral part of an IoT system. Authentication and access control are the two principal security requirements for ensuring authorized and restricted accesses to limited and essential resources in IoT. The built-in authentication mechanism in IoT devices is not reliable, because several security vulnerabilities are revealed in the firmware implementation of authentication protocols in IoT. On the other hand, the current authentication approaches for IoT that are not firmware are vulnerable to some security attacks prevalent in IoT. Moreover, the recent access control approaches for IoT have limitations in context-awareness, scalability, interoperability, and security. To mitigate these limitations, there is a need for a robust authentication and access control system to safeguard the rapidly growing number of IoT devices. Consequently, in this paper, we propose a new secure unified authentication and access control system for IoT, called SUACC-IoT. The proposed system is based around the notion of capability, where a capability is considered as a token containing the access rights for authorized entities in the network. In the proposed system, the capability token is used to ensure authorized and controlled access to limited resources in IoT. The system uses only lightweight Elliptic Curve Diffie-Hellman Ephemeral (ECDHE), symmetric key encryption/decryption, message authentication code and cryptographic hash primitives. SUACC-IoT is proved to be secure against probabilistic polynomial-time adversaries and various attacks prevalent in IoT. The experimental results demonstrate that the proposed protocol's maximum CPU usage is 29.35%, maximum memory usage is 2.79% and computational overhead is 744.5 ms which are quite acceptable. Additionally, in SUACC-IoT, a reasonable communication cost of 872 bits is incurred for the longest message exchanged.
引用
收藏
页码:2409 / 2428
页数:20
相关论文
共 50 条
  • [1] SUACC-IoT: secure unified authentication and access control system based on capability for IoT
    N. Sivaselvan
    K. Vivekananda Bhat
    Muttukrishnan Rajarajan
    Ashok Kumar Das
    Joel J. P. C. Rodrigues
    Cluster Computing, 2023, 26 : 2409 - 2428
  • [2] A Secure Authentication and Access Control Scheme for CoAP-based IoT
    Obaidat, Muath A.
    Choong, Jian Lim
    Thakur, Kutub
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 145 - 149
  • [3] Authentication and Capability-based Access Control: An Integrated Approach for IoT Environment
    Sivaselvan, N.
    Asif, Waqar
    Bhat, Vivekananda K.
    Rajarajan, Muttukrishnan
    2020 12TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2020), 2020, : 110 - 117
  • [4] Secure and Efficient CoAP Based Authentication and Access Control for Internet of Things (IoT)
    Tamboli, Mohsin B.
    Ambawade, Dayanand D.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1245 - 1250
  • [5] Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment
    Sivaselvan, N.
    Bhat, Vivekananda K.
    Rajarajan, Muttukrishnan
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 323 - 330
  • [6] Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT
    Anggorojati, Bayu
    Mahalle, Parikshit Narendra
    Prasad, Neeli Rashmi
    Prasad, Ramjee
    INTERNET OF THINGS AND M2M COMMUNICATIONS, 2013, : 135 - 160
  • [7] Blockchain based authentication and access control protocol for IoT
    Singh, Akanksha
    Chandra, Harish
    Rana, Saurabh
    Chhikara, Deepak
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) : 51731 - 51753
  • [8] Blockchain based authentication and access control protocol for IoT
    Akanksha Singh
    Harish Chandra
    Saurabh Rana
    Deepak Chhikara
    Multimedia Tools and Applications, 2024, 83 : 51731 - 51753
  • [9] Framework for authentication and access control in IoT
    Bate, Kossi Owoude
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 34 - 39
  • [10] A Traceable Capability-based Access Control for IoT
    Li, Chao
    Li, Fan
    Huang, Cheng
    Yin, Lihua
    Luo, Tianjie
    Wang, Bin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (03): : 4967 - 4982