LISA: Visible light based initialization and SMS based authentication of constrained IoT devices

被引:4
|
作者
Perkovic, Toni [1 ]
Cagalj, Mario [2 ]
Kovacevic, Tonko [3 ]
机构
[1] Univ Split, Univ Dept Forens Studies, Split, Croatia
[2] Univ Split, FESB, Dept Elect Engn, Split, Croatia
[3] Univ Split, Univ Dept Profess Studies, Split, Croatia
关键词
Wireless devices; Key deployment; Visible light channel; Authentication; SECURITY;
D O I
10.1016/j.future.2019.02.052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Future healthcare systems, smart homes, power management systems will all involve a large number of smart inter-connected wireless devices (such as wireless sensor and IoT nodes). One of the major challenges to securing these systems presents loading initial cryptographic credentials into a relatively large number of wireless devices. This challenge is further aggravated by the fact that many of these technologies and systems involve low-cost and highly interface constrained devices - lacking usual wired interfaces, displays, keypads, and alike. In this paper we propose two novel multichannel key deployment schemes for wireless (sensor) networks, LISA and LISAT, that only require a presence of a light source device, such as a multitouch screen, tablet or a smartphone device. Both key deployment schemes are secret key-based multichannel protocols and are suitable for interface/resource constrained wireless devices. We use one-way visible light channel (VLC) of multitouch screens (the flashing displays) to initialize sensor devices in a secure, usable and scalable way. More interestingly, LISAT protocol is suited for initialization of geographically remote devices via a trusted third party device. We provide formal analysis of the proposed protocols using the automated verification tool. From the user's perspective of protocol execution, device initialization is quite simple as user simply places the devices on the top of the multitouch screen after which the remaining process is fully automatized. Indeed, through the experiments with 34 users we showed that our solution is user-friendly and has a good performance concerning the time consumption. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 50 条
  • [1] Novel Light Weight Hardware Authentication Protocol for Resource Constrained IoT Based Devices
    Vijaykumar, V. R.
    Sekar, S. Raja
    Jothin, R.
    Diniesh, V. C.
    Elango, S.
    Ramakrishnan, S.
    IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2024, 8 (31-42): : 31 - 42
  • [2] BlinkComm: Initialization of IoT Devices Using Visible Light Communication
    Perkovic, Toni
    Kovacevic, Tonko
    Cagalj, Mario
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [3] A Blockchain Based Decentralized Authentication Framework for Resource Constrained IOT devices
    Panda, Soumyashree S.
    Satapathy, Utkalika
    Mohanta, Bhabendu K.
    Jena, Debasish
    Gountia, Debasis
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [4] A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices
    Mahalat, Mahabub Hasan
    Saha, Shreya
    Mondal, Anindan
    Sen, Bibhash
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 183 - 187
  • [5] SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices
    Farha, Fadi
    Ning, Huansheng
    Ali, Karim
    Chen, Liming
    Nugent, Christopher
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5904 - 5913
  • [6] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [7] DLT Based Authentication Framework for Industrial IoT Devices
    Lupascu, Cristian
    Lupascu, Alexandru
    Bica, Ion
    SENSORS, 2020, 20 (09)
  • [8] A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
    Idriss, Tarek A.
    Idriss, Haytham A.
    Bayoumi, Magdy A.
    IEEE ACCESS, 2021, 9 : 80546 - 80558
  • [9] Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
    Chauhan, Jagmohan
    Seneviratne, Suranga
    Hu, Yining
    Misra, Archan
    Seneviratne, Aruna
    Lee, Youngki
    COMPUTER, 2018, 51 (05) : 60 - 67
  • [10] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43