Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

被引:7
作者
Shah, Syed W. [1 ]
Syed, Naeem F. [1 ]
Shaghaghi, Arash [1 ]
Anwar, Adnan [1 ]
Baig, Zubair [1 ]
Doss, Robin [1 ]
机构
[1] Deakin Univ, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic, Australia
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
Zero Trust Architecture (ZTA); Continuous Authentication; Device-to-Device; Internet of Things (IoT);
D O I
10.1109/TrustCom50675.2020.00148
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, lightweight and secure CA protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys. Our preliminary informal protocol analysis suggests that the proposed protocol is resistant to known attack vectors and thus has strong potential for deployment in securing critical and resource-constrained d2d communication.
引用
收藏
页码:1120 / 1127
页数:8
相关论文
共 9 条
[1]   Fast authentication in wireless sensor networks [J].
Benzaid, Chafika ;
Lounis, Karim ;
Al-Nemrat, Ameer ;
Badache, Nadjib ;
Alazab, Mamoun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :362-375
[2]   S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol [J].
Chen, Dajiang ;
Zhang, Ning ;
Qin, Zhen ;
Mao, Xufei ;
Qin, Zhiguang ;
Shen, Xuemin ;
Li, Xiang-Yang .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :88-100
[3]   A Lightweight Continuous Authentication Protocol for the Internet of Things [J].
Chuang, Yo-Hsuan ;
Lo, Nai-Wei ;
Yang, Cheng-Ying ;
Tang, Ssu-Wei .
SENSORS, 2018, 18 (04)
[4]   Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication [J].
Frank, Mario ;
Biedert, Ralf ;
Ma, Eugene ;
Martinovic, Ivan ;
Song, Dawn .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :136-148
[5]  
Li L, 2014, CHANDOS INF PROF SER, P1
[6]  
Rose S., 2019, ZERO TRUST ARCHITECT
[7]   Continuous user authentication using multi-modal biometrics [J].
Saevanee, Hataichanok ;
Clarke, Nathan ;
Furnell, Steven ;
Biscione, Valerio .
COMPUTERS & SECURITY, 2015, 53 :234-246
[8]   Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments [J].
Sathyadevan, Shiju ;
Achuthan, Krishnashree ;
Doss, Robin ;
Pan, Lei .
IEEE ACCESS, 2019, 7 :92419-92435
[9]  
Yu B., 2019, 2019 IEEE Global Communications Conference (GLOBECOM), P1