Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems

被引:15
作者
Deebak, B. D. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
Internet of things; Security; Authentication and key management; Performance; Transmission delay; Throughput rate; REMOTE USER AUTHENTICATION; THINGS IOT; SECURE; INTERNET; SCHEME; PROTOCOL; PRIVACY;
D O I
10.1016/j.scs.2020.102416
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of Things (IoT) utilizes an intelligent technique to facilitate the design and development of smart-urban projects. As the smart devices have limited battery sources, IoT services should initiate its setup with low-power consumption. Most of the existing approaches use Long Range Wide Area Network (LoRa-WAN) as a media access layer. It provides a long-range communication between the smart devices and application systems over Low Power Wide Area Network (LP-WAN). However, it fails to achieve end-to-end security and perfect secrecy to guarantee access security of the channels. An objective of mobile-sink is to solve the problem of data confidentiality, mutual authentication, session-key agreement, and preventing potential attacks. Thus, this paper presents a lightweight based authentication and key management (L-AKM) scheme for Smart IoT-Assisted Systems. To accomplish the key objectives of L-AKM, a lightweight continuous authentication was preferred that adopts the valid authentication period and continuous user authentication session to speed up the authentication process. The performance analysis proves that the L-AKM scheme achieves better security efficiencies to resist various potential attacks such as forgery, replay, password guessing, etc. However, the experimental analysis shows that the proposed L-AKM consumes more transmission delay and throughput rate due to extra authentication phases.
引用
收藏
页数:15
相关论文
共 49 条
  • [1] Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks
    Al-Turjman, Fadi
    Ever, Yoney Kirsal
    Ever, Enver
    Nguyen, Huan X.
    David, Deebak Bakkiam
    [J]. IEEE ACCESS, 2017, 5 : 24617 - 24631
  • [2] [Anonymous], 1997, P 10 IEEE WORKSH COM
  • [3] [Anonymous], 2014, World's population increasingly urban with more than half living in urban areas
  • [4] [Anonymous], 2008, INTELLIGENT INFRASTR
  • [5] Awoleye O.M., 2014, Government Information Quarterly, V31, pS118, DOI [10.1016/j.giq.2014.01.012, DOI 10.1016/J.GIQ.2014.01.012, https://doi.org/10.1016/j.giq.2014.01.012]
  • [6] Relating symbolic and cryptographic secrecy
    Backes, M
    Pfitzmann, B
    [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 171 - 182
  • [7] Internet of Things: Applications and Challenges in Technology and Standardization
    Bandyopadhyay, Debasis
    Sen, Jaydip
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) : 49 - 69
  • [8] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445
  • [9] Bardyn JP, 2016, PROC EUR SOLID-STATE, P25, DOI 10.1109/ESSCIRC.2016.7598235
  • [10] Bormann C., 2014, INTERNET ENG TASK FO