A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks

被引:2
作者
Yuan, Shengli [1 ]
Phan-Huynh, Randy [1 ]
机构
[1] Univ Houston Downtown, Dept Comp Sci, Houston, TX 77002 USA
来源
2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF | 2022年
关键词
Internet of Things (IoT); Authentication; Hash Chain;
D O I
10.1109/FNWF55208.2022.00021
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As an emerging technology, IoT is rapidly revolutionizing the global communication network with billions of new devices deployed and connected with each other. Many of these devices collect and transfer a large amount of sensitive or mission critical data, making security a top priority. Compared to traditional Internet, IoT networks often operate in open and harsh environment, and may experience frequent delays, traffic loss and attacks; Meanwhile, IoT devices are often severally constrained in computational power, storage space, network bandwidth, and power supply, which prevent them from deploying traditional security schemes. Authentication is an important security mechanism that can be used to identify devices or users. Due to resource constrains of IoT networks, it is highly desirable for the authentication scheme to be lightweight while also being highly effective. In this paper, we developed and evaluated a hash-chain-based multi-node mutual authentication algorithm. Nodes on a network all share a common secret key and broadcast to other nodes in range. Each node may also add to the hash chain and rebroadcast, which will be used to authenticate all nodes in the network. This algorithm has a linear running time and complexity of O(n), a significant improvement from the O(n(2)) running time and complexity of the traditional pairwise multi-node mutual authentication.
引用
收藏
页码:72 / 74
页数:3
相关论文
共 7 条
[1]  
Du XR, 2014, IEEE INFOCOM SER, P1276, DOI 10.1109/INFOCOM.2014.6848060
[2]   Evaluating Critical Security Issues of the IoT World: Present and Future Challenges [J].
Frustaci, Mario ;
Pace, Pasquale ;
Aloi, Gianluca ;
Fortino, Giancarlo .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2483-2495
[3]  
Kaufman C., 2002, Network Security: Private Commu- nication in a Public World, V2nd
[4]   A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications [J].
Lin, Jie ;
Yu, Wei ;
Zhang, Nan ;
Yang, Xinyu ;
Zhang, Hanlin ;
Zhao, Wei .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1125-1142
[5]   IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices [J].
Meneghello, Francesca ;
Calore, Matteo ;
Zucchetto, Daniel ;
Polese, Michele ;
Zanella, Andrea .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8182-8201
[6]   A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols [J].
Tomic, Ivana ;
McCann, Julie A. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1910-1923
[7]   A Survey on Security and Privacy Issues in Internet-of-Things [J].
Yang, Yuchen ;
Wu, Longfei ;
Yin, Guisheng ;
Li, Lijie ;
Zhao, Hongbin .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1250-1258