A fast and scalable authentication scheme in IOT for smart living

被引:18
作者
Li, Jianhua [1 ]
Jin, Jiong [2 ]
Lyu, Lingjuan [3 ]
Yuan, Dong [4 ]
Yang, Yingying [5 ]
Gao, Longxiang [1 ]
Shen, Chao [6 ]
机构
[1] Deakin Univ, Sch Info Technol, Melbourne, Vic 3125, Australia
[2] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[3] Natl Univ Singapore, Singapore, Singapore
[4] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
[5] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW 2007, Australia
[6] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Shx, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 117卷
关键词
Internet of things (IoT); Fog computing; Device-to-device authentication; Microservice; Certificate authority (CA); Virtualization; INTERNET; SECURITY; FOG; THINGS; CHALLENGES; PLACEMENT; PRIVACY;
D O I
10.1016/j.future.2020.11.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Numerous resource-limited smart objects (SOs) such as sensors and actuators have been widely deployed in smart environments, opening new attack surfaces to intruders. The severe security flaw discourages the adoption of the Internet of things in smart living. In this paper, we leverage fog computing and microservice to push certificate authority (CA) functions to the proximity of data sources. Through which, we can minimize attack surfaces and authentication latency, and result in a fast and scalable scheme in authenticating a large volume of resource-limited devices. Then, we design lightweight protocols to implement the scheme, where both a high level of security and low computation workloads on SO (no bilinear pairing requirement on the client-side) is accomplished. Evaluations demonstrate the efficiency and effectiveness of our scheme in handling authentication and registration for a large number of nodes, meanwhile protecting them against various threats to smart living. Finally, we showcase the success of computing intelligence movement towards data sources in handling complicated services. (C) 2020 Published by Elsevier B.V.
引用
收藏
页码:125 / 137
页数:13
相关论文
共 60 条
  • [1] The role of big data analytics in Internet of Things
    Ahmed, Ejaz
    Yaqoob, Ibrar
    Hashem, Ibrahim Abaker Targio
    Khan, Imran
    Ahmed, Abdelmuttlib Ibrahim Abdalla
    Imran, Muhammad
    Vasilakos, Athanasios V.
    [J]. COMPUTER NETWORKS, 2017, 129 : 459 - 471
  • [2] Lightweight Encryption for Smart Home
    Al Salami, Sanaah
    Baek, Joonsang
    Salah, Khaled
    Damiani, Ernesto
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 382 - 388
  • [3] Ali I., 2019, ARXIV190107309
  • [4] Almadhoun R, 2018, I C COMP SYST APPLIC
  • [5] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [6] Anderson M., 2014, IEEE SPECTR
  • [7] [Anonymous], 2016, PROC 25 INT C COMPUT
  • [8] [Anonymous], 2020, ELECTRONICS, DOI DOI 10.3390/ELECTR0NICS9060989
  • [9] Bringer J, 2008, LECT NOTES COMPUT SC, V5339, P149, DOI 10.1007/978-3-540-89641-8_11
  • [10] Cervesato I., 2001, P 16 ANN S LOG COMP, V1, P1