A lightweight authentication and management method for Internet of Things

被引:2
作者
Cetintav, Isil [1 ,2 ]
Sandikkaya, Mehmet Tahir [1 ]
机构
[1] Istanbul Tech Univ, Dept Comp Engn, TR-34469 Istanbul, Turkiye
[2] Trakya Univ, Dept Comp Engn, TR-22030 Edirne, Turkiye
关键词
Internet of Things; Lightweight authentication; IoT security; IoT management; IoT key exchange; PROTOCOL; SECURE; SCHEME; IOT;
D O I
10.1016/j.iot.2023.100842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) devices are vulnerable due to their limited resources and inadequate security mechanisms. The number of IoT devices has increased day by day, so the number of devices that are connected to the Internet has also increased. Devices may be deployed anywhere and made available to anyone, making the management of numerous devices problematic. Device management is crucial, as the compromise of IoT devices might cause serious consequences and already there are examples of such a compromise caused widespread DDoS attacks. This paper aims to propose a mechanism that ensures the security of IoT devices and presents a management model and lightweight authentication mechanism simultaneously. The proposed mechanism is novel, computationally lightweight, financially low-cost, remotely usable, and requires no special hardware. This mechanism includes a key management phase to generate ephemeral keys for every session and a trivial and cost-efficient data transfer phase. The proposed mechanism provides an IoT device management model to achieve a scalable IoT environment. Data is transferred cost-effectively via XORs and hash functions. The security of the authentication mechanism is formally verified using AVISPA model checker.
引用
收藏
页数:15
相关论文
共 21 条
  • [1] A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications
    al Mahmod, Md Jubayer
    Guin, Ujjwal
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 20
  • [2] A robust authentication and access control protocol for securing wireless healthcare sensor networks
    Ali, Zeeshan
    Ghani, Anwar
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Giri, Debasis
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [3] Data Provenance for IoT With Light Weight Authentication and Privacy Preservation
    Aman, Muhammad Naveed
    Basheer, Mohammed Haroon
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10441 - 10457
  • [4] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [5] Blom R., 1982, ADV CRYPTOLOGY, P231
  • [6] Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
    Chang, Ya-Fen
    Tai, Wei-Liang
    Chang, Hung-Chin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 3430 - 3440
  • [7] Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
    Fan, Kai
    Gong, Yuanyuan
    Liang, Chen
    Li, Hui
    Yang, Yintang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3095 - 3104
  • [8] Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments
    Huang, Jheng-Jia
    Juang, Wen-Shenq
    Fan, Chun-I
    Tseng, Yi-Fan
    Kikuchi, Hiroaki
    [J]. ADJUNCT PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING NETWORKING AND SERVICES (MOBIQUITOUS 2016), 2016, : 88 - 93
  • [9] Isawa R., 2011, ONE TIME PASSWORD AU
  • [10] An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System
    Ji, Sai
    Liu, Shuai
    Wang, Chen
    Qi, Rongxin
    Shen, Jian
    [J]. ELECTRONICS, 2020, 9 (12) : 1 - 16