A Trustworthy, Reliable, and Lightweight Privacy and Data Integrity Approach for the Internet of Things

被引:7
|
作者
Khan, Rahim [1 ,2 ]
Teo, Jason [1 ]
Jan, Mian Ahmad [2 ]
Verma, Sahil [3 ]
Alturki, Ryan [4 ]
Ghani, Abdullah [1 ]
机构
[1] Univ Malaysia Sabah, Fac Comp & Informat, Kota Kinabalu 88400, Sabah, Malaysia
[2] Abdul Wali Khan Univ Mardan, Mardan 23200, Pakistan
[3] Chandigarh Univ, Dept Comp Sci & Engn, Mohali 140413, India
[4] Umm Al Aura Univ, Coll Comp & Informat Syst, Dept Informat Sci, Mecca 21955, Saudi Arabia
关键词
Authenticity; communication; data integrity; Internet of Things (IoT); security; USER AUTHENTICATION; KEY AGREEMENT; SCHEME; PROTOCOL;
D O I
10.1109/TII.2022.3179728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data integrity and authenticity are among the key challenges faced by the interacting devices of Internet of Things (IoT). The resource-constrained nature of sensor-embedded devices makes it even more difficult to design lightweight security schemes for these networks. In view of limited resources of the IoT devices, this article proposes a lightweight and trustworthy device-to-server mutual authentication scheme for edge-enabled IoT networks. Initially, a trusted authority generates and assigns identities (IDs) and mask them to servers and clients, also known as member devices, in an offline phase. These IDs are utilized to prevent possible infiltration of the adversary device(s). Next, every device ensures the authenticity of requesting devices using a sophisticated challenge, which is encrypted using a 128-b secret key, lambda(i). Each device expects a reply from the intended destination device for resolving the encrypted challenge within the defined timeframe, i.e., Delta T. Moreover, authenticity of the requesting device is verified through the stored IDs, which are shared in the offline phase. Simulation results have verified the exceptional performance of the proposed authentication scheme against field proven approaches in terms of computational and communication costs.
引用
收藏
页码:511 / 518
页数:8
相关论文
共 50 条
  • [31] Data privacy in the Internet of Things based on anonymization: A review
    Neves, Flavio
    Souza, Rafael
    Sousa, Juliana
    Bonfim, Michel
    Garcia, Vinicius
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (03) : 261 - 291
  • [32] Software Defined Ambit of Data Integrity for the Internet of Things
    Karimi, Maryam
    Krishnamurthy, Prashant
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 737 - 745
  • [33] On Lightweight Privacy-Preserving Collaborative Learning for Internet-of-Things Objects
    Jiang, Linshan
    Tan, Rui
    Lou, Xin
    Lin, Guosheng
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI '19), 2019, : 70 - 81
  • [34] Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare
    Tang, Yanghuijie
    Xiong, Ling
    He, Mingxing
    Chen, Liangjiang
    FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 613 - 625
  • [35] A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications
    Sani, Abubakar Sadiq
    Yuan, Dong
    Yeoh, Phee Lep
    Bao, Wei
    Chen, Shiping
    Vucetic, Branka
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [36] Secure and lightweight privacy preserving Internet of things integration for remote patient monitoring
    Ahmed, Mohammed Imtyaz
    Kannan, Govindaraj
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6895 - 6908
  • [37] SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things
    Sylla, Tidiane
    Chalouf, Mohamed Aymen
    Krief, Francine
    Samake, Karim
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [38] A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper)
    Ezennaya-Gomez, Salatiel
    Vielhauer, Claus
    Dittmann, Jana
    COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 413 - 423
  • [39] A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance
    Haiyong Bao
    Rongxing Lu
    Peer-to-Peer Networking and Applications, 2017, 10 : 106 - 121
  • [40] A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance
    Bao, Haiyong
    Lu, Rongxing
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 106 - 121