Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments

被引:25
作者
Sathyadevan, Shiju [1 ,2 ]
Achuthan, Krishnashree [1 ]
Doss, Robin [2 ]
Pan, Lei [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Ctr Cyber Secur Syst & Networks, Kollam 690525, India
[2] Deakin Univ, Ctr Cyber Secur Res, Geelong, Vic 3220, Australia
关键词
Edge node authentication; IoT authentication; IoT security; time-bound IoT authentication; resource constrained devices; SECURITY; INTERNET;
D O I
10.1109/ACCESS.2019.2927818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IoT edge/sensor nodes are exposed to large attack surface and could easily succumb to several well-known attacks in the wireless sensor network (WSN) domain Authenticating edge nodes before they join a network, especially after a sleep state, is a critical step to maintain the overall trust of any given IoT local area network (IoT LAN). The low resources and computational constraints of such IoT nodes make this a challenging and non-trivial problem. As many IoT deployments are in uncontrolled environments, the IoT devices are often placed in the open so that physical access to them is inevitable. Due to easy physical access of the devices, common attacks, including cloning of devices or stealing secret keys stored in an edge node, are some of the most common attacks on the IoT deployments. This paper focuses on developing an extremely lightweight authentication scheme for constrained end-devices that are part of a given IoT LAN. Authentication occurs between the end-device and the gateway that acts as an edge computing device. The proposed authentication scheme is put through both formal and informal security verification. Voltage drop, current, and power are measured to gauge the overall impact of the security scheme. All the three parameters were measured while configuring the edge node as an end-device or as a router. Our testing results show that the impact on the resources was minimal.
引用
收藏
页码:92419 / 92435
页数:17
相关论文
共 34 条
[1]  
[Anonymous], 2015, ZIGBEE EXPLOITED GOO
[2]  
[Anonymous], 2015, ONLINE AUTHENTICATIO
[3]  
Asanghanwa E., 2016, 112015 ATM
[4]   Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems [J].
Butler, Kevin R. B. ;
Ryu, Sunam ;
Traynor, Patrick ;
McDaniel, Patrick D. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (12) :1803-1815
[5]  
Chen JC, 2005, IEEE COMMUN MAG, V43, pS26
[6]   A Lightweight Continuous Authentication Protocol for the Internet of Things [J].
Chuang, Yo-Hsuan ;
Lo, Nai-Wei ;
Yang, Cheng-Ying ;
Tang, Ssu-Wei .
SENSORS, 2018, 18 (04)
[7]  
Dini Gianluca, 2010, IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2010), P58, DOI 10.1109/SUTC.2010.15
[8]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[9]  
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[10]  
Grossschadl J., 2007, P 2 ACM S INF COMP C, P380, DOI DOI 10.1145/1229285.1229334