An Authentication Protocol for Next Generation of Constrained IoT Systems

被引:19
作者
Rostampour, Samad [1 ]
Bagheri, Nasour [2 ]
Bendavid, Ygal [3 ]
Safkhani, Masoumeh [4 ]
Kumari, Saru [5 ]
Rodrigues, Joel J. P. C. [6 ,7 ]
机构
[1] Vanier Coll, Dept Comp Sci, Montreal, PQ H4L 3X9, Canada
[2] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, CPS2 Lab, Tehran 1678815811, Iran
[3] UQAM Univ, AOTI Dept, Montreal, PQ H2L 2C4, Canada
[4] Shahid Rajaee Teacher Training Univ, Dept Comp Engn, Tehran 1678815811, Iran
[5] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[6] China Univ Petr, Coll Comp Sci & Technol, Qingdao 266555, Peoples R China
[7] Inst Telecomunicacoes, P-6201001 Covilha, Portugal
关键词
Protocols; Internet of Things; Security; Authentication; Cryptography; Encryption; NIST; authenticated encryption (AE); Internet of Things (IoT); radio-frequency identification (RFID); security; ECC-BASED AUTHENTICATION; KEY EXCHANGE; PROVABLY SECURE; INTERNET; ENCRYPTION; NETWORKS; NOTIONS; SCHEME;
D O I
10.1109/JIOT.2022.3184293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the exponential growth of connected Internet of Things (IoT) devices around the world, security protection and privacy preservation have risen to the forefront of design and development of innovative systems and services. For low-value IoT devices that identify and track billion of goods in various industries-such as radio-frequency identification (RFID) tags-this involves multiple challenges in very constrained environments. IoT devices aim to design low-cost, low-complexity infrastructure while enabling robust authentication protocols with reduced latency and energy consumption. Given these challenges, in this article, we present a new lightweight authentication protocol for IoT applications, employing an authenticated-encryption (AE) cryptosystem with associated data (AEAD). Since AEAD algorithms provide data confidentiality and message integrity simultaneously, security analysis [Real-or-Random (RoR) and Scyther] results prove the robustness of the proposed protocol against IoT threats. Furthermore, to measure the computation and communication cost, FPGA and ASIC simulations using four different AEAD candidates of National Institute of Standards and Technology (NIST) lightweight cryptography competition are executed. The implementation results [e.g., 4744 gate equivalent (GE) and 0.87-mw power] clearly show that our novel design can be applied to a wide range of constrained IoT devices complying with low-cost, lightweight, and high-speed requirements.
引用
收藏
页码:21493 / 21504
页数:12
相关论文
共 50 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] A multi-attack resilient lightweight IoT authentication scheme
    Adeel, Adil
    Ali, Mazhar
    Khan, Abdul Nasir
    Khalid, Tauqeer
    Rehman, Faisal
    Jararweh, Yaser
    Shuja, Junaid
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
  • [3] SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Kaliyar, Pallavi
    Conti, Mauro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 621 - 634
  • [4] Landscape of IoT security
    Aidoo, Andy
    Schiller, Eryk
    Fuhrer, Jara
    Stahl, Jonathan
    Ziorjen, Michael
    Stiller, Burkhard
    [J]. COMPUTER SCIENCE REVIEW, 2022, 44
  • [5] Alizadeh J., 2014, IACR CRYPTOL
  • [6] Alizadeh J, 2014, ISECURE-ISC INT J IN, V6, P125
  • [7] Andreeva E., FORKAE
  • [8] [Anonymous], GOOD PRACT IOT SMART
  • [9] [Anonymous], 2019, STAT ENT IOT SEC N A
  • [10] [Anonymous], IOT CYB IMPR ACT 202