A lightweight mutual and transitive authentication mechanism for IoT network

被引:10
|
作者
Krishnasrija, Rudra [1 ]
Mandal, Amit Kr. [1 ]
Cortesi, Agostino [2 ]
机构
[1] SRM Univ, Ap Amaravati, India
[2] Ca Foscari Univ, Venice, Italy
关键词
IoT authentication; Device-to-device authentication; Key agreement; BAN-logic; Scyther; KEY AGREEMENT PROTOCOL; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; SMART HOME; SCHEME; SECURE; INTERNET; EFFICIENT;
D O I
10.1016/j.adhoc.2022.103003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT devices are typically authenticated directly by gateways present in the network. However, in large and complex IoT systems like the smart city or smart industry which consist of thousands of connected devices, it may not be always feasible to be directly connected to the gateway while it may be possible to be connected to another device. Therefore, already authenticated devices should facilitate the new device to get authenticated by the gateway. To address this issue, the existing protocols use multiple authentication protocols based on different cryptography techniques, which are difficult to implement and manage in resource constrained IoT devices. In this paper, we propose a Transitive device authentication protocol based on the Chebyshev polynomial. The transitive authentication protocol utilizes the session key established in the mutual authentication between the intermediate device and gateway. Both the mutual authentication and transitive authentication protocols are relying on the same preregistration and authentication mechanism. To ensure the security of the proposed authentication protocol, detailed security analysis is carried out, and the secure session key establishment is verified using the BAN logic. Moreover, the proposed protocol is tested against crucial attacks in the Scyther tool. These formal analyses and Scyther attack simulation show that the proposed protocol is capable of withstanding critical attacks. Finally, to verify the efficiency, the protocol implementation is experimentally compared with similar approaches studied in the literature. The results show that the proposed protocol offers better performance, providing significantly lower response time, handshake duration, memory utilization, and energy consumption.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A decentralized lightweight blockchain-based authentication mechanism for IoT systems
    Umair Khalid
    Muhammad Asim
    Thar Baker
    Patrick C. K. Hung
    Muhammad Adnan Tariq
    Laura Rafferty
    Cluster Computing, 2020, 23 : 2067 - 2087
  • [32] A decentralized lightweight blockchain-based authentication mechanism for IoT systems
    Khalid, Umair
    Asim, Muhammad
    Baker, Thar
    Hung, Patrick C. K.
    Tariq, Muhammad Adnan
    Rafferty, Laura
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 2067 - 2087
  • [33] Security of lightweight mutual authentication protocols
    Yu-Ju Tu
    Gaurav Kapoor
    Selwyn Piramuthu
    The Journal of Supercomputing, 2021, 77 : 4565 - 4581
  • [34] Security of lightweight mutual authentication protocols
    Tu, Yu-Ju
    Kapoor, Gaurav
    Piramuthu, Selwyn
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4565 - 4581
  • [35] Physically Secure Mutual Authentication for IoT
    Aman, Muhammad Naveed
    Chua, Kee Chaing
    Sikdar, Biplab
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 310 - 317
  • [36] Lightweight Authentication for IOT Edge Devices
    Zerraza, Imane
    Informatica (Slovenia), 2024, 48 (18): : 15 - 20
  • [37] Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols
    Safkhani, Masoumeh
    Rostampour, Samad
    Bendavid, Ygal
    Sadeghi, Sadegh
    Bagheri, Nasour
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [38] LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
    Wang, Fei
    Xu, Yongjun
    Zhu, Liehuang
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4462 - 4471
  • [39] Lightweight Authentication Methods in IoT: Survey
    Ahmed, Waleed Kareem
    Mohammed, Rana Saad
    PROCEEDING OF THE 2ND 2022 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (CSASE 2022), 2022, : 241 - 246
  • [40] Weakness of Ultra-Lightweight Mutual Authentication Protocol for IoT Devices Using RFID Tags
    Khor, Jing Huey
    Sidorov, Michail
    2018 8TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST 2018), 2018, : 91 - 97