Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems

被引:16
作者
Deebak, B. D. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
Internet of things; Security; Authentication and key management; Performance; Transmission delay; Throughput rate; REMOTE USER AUTHENTICATION; THINGS IOT; SECURE; INTERNET; SCHEME; PROTOCOL; PRIVACY;
D O I
10.1016/j.scs.2020.102416
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Internet of Things (IoT) utilizes an intelligent technique to facilitate the design and development of smart-urban projects. As the smart devices have limited battery sources, IoT services should initiate its setup with low-power consumption. Most of the existing approaches use Long Range Wide Area Network (LoRa-WAN) as a media access layer. It provides a long-range communication between the smart devices and application systems over Low Power Wide Area Network (LP-WAN). However, it fails to achieve end-to-end security and perfect secrecy to guarantee access security of the channels. An objective of mobile-sink is to solve the problem of data confidentiality, mutual authentication, session-key agreement, and preventing potential attacks. Thus, this paper presents a lightweight based authentication and key management (L-AKM) scheme for Smart IoT-Assisted Systems. To accomplish the key objectives of L-AKM, a lightweight continuous authentication was preferred that adopts the valid authentication period and continuous user authentication session to speed up the authentication process. The performance analysis proves that the L-AKM scheme achieves better security efficiencies to resist various potential attacks such as forgery, replay, password guessing, etc. However, the experimental analysis shows that the proposed L-AKM consumes more transmission delay and throughput rate due to extra authentication phases.
引用
收藏
页数:15
相关论文
共 49 条
[1]   Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks [J].
Al-Turjman, Fadi ;
Ever, Yoney Kirsal ;
Ever, Enver ;
Nguyen, Huan X. ;
David, Deebak Bakkiam .
IEEE ACCESS, 2017, 5 :24617-24631
[2]  
[Anonymous], 1997, P 10 IEEE WORKSH COM
[3]  
[Anonymous], 2014, World's population increasingly urban with more than half living in urban areas
[4]  
[Anonymous], 2014, INTERNET ENG TASK FO
[5]  
[Anonymous], 2008, INTELLIGENT INFRASTR
[6]  
Awoleye O.M., 2014, Government Information Quarterly, V31, pS118, DOI [10.1016/j.giq.2014.01.012, DOI 10.1016/J.GIQ.2014.01.012]
[7]   Relating symbolic and cryptographic secrecy [J].
Backes, M ;
Pfitzmann, B .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :171-182
[8]   Internet of Things: Applications and Challenges in Technology and Standardization [J].
Bandyopadhyay, Debasis ;
Sen, Jaydip .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) :49-69
[9]   Privacy-Preserving Channel Access for Internet of Things [J].
Banerjee, Debasmit ;
Dong, Bo ;
Taghizadeh, Mahmoud ;
Biswas, Subir .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05) :430-445
[10]  
Bardyn JP, 2016, PROC EUR SOLID-STATE, P25, DOI 10.1109/ESSCIRC.2016.7598235