LISA: Visible light based initialization and SMS based authentication of constrained IoT devices

被引:4
|
作者
Perkovic, Toni [1 ]
Cagalj, Mario [2 ]
Kovacevic, Tonko [3 ]
机构
[1] Univ Split, Univ Dept Forens Studies, Split, Croatia
[2] Univ Split, FESB, Dept Elect Engn, Split, Croatia
[3] Univ Split, Univ Dept Profess Studies, Split, Croatia
关键词
Wireless devices; Key deployment; Visible light channel; Authentication; SECURITY;
D O I
10.1016/j.future.2019.02.052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Future healthcare systems, smart homes, power management systems will all involve a large number of smart inter-connected wireless devices (such as wireless sensor and IoT nodes). One of the major challenges to securing these systems presents loading initial cryptographic credentials into a relatively large number of wireless devices. This challenge is further aggravated by the fact that many of these technologies and systems involve low-cost and highly interface constrained devices - lacking usual wired interfaces, displays, keypads, and alike. In this paper we propose two novel multichannel key deployment schemes for wireless (sensor) networks, LISA and LISAT, that only require a presence of a light source device, such as a multitouch screen, tablet or a smartphone device. Both key deployment schemes are secret key-based multichannel protocols and are suitable for interface/resource constrained wireless devices. We use one-way visible light channel (VLC) of multitouch screens (the flashing displays) to initialize sensor devices in a secure, usable and scalable way. More interestingly, LISAT protocol is suited for initialization of geographically remote devices via a trusted third party device. We provide formal analysis of the proposed protocols using the automated verification tool. From the user's perspective of protocol execution, device initialization is quite simple as user simply places the devices on the top of the multitouch screen after which the remaining process is fully automatized. Indeed, through the experiments with 34 users we showed that our solution is user-friendly and has a good performance concerning the time consumption. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:105 / 118
页数:14
相关论文
共 50 条
  • [31] A lightweight machine learning-based authentication framework for smart IoT devices
    Punithavathi, P.
    Geetha, S.
    Karuppiah, Marimuthu
    Islam, S. K. Hafizul
    Hassan, Mohammad Mehedi
    Choo, Kim-Kwang Raymond
    INFORMATION SCIENCES, 2019, 484 : 255 - 268
  • [32] An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
    Wu, Yi
    Feng, Tao
    SENSORS, 2022, 22 (17)
  • [33] BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices
    Gong, Liangqin
    Alghazzawi, Daniyal M.
    Cheng, Li
    INFORMATION, 2021, 12 (05)
  • [34] PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices
    Fei, Hongming
    Millwood, Owen
    Gope, Prosanta
    Miskelly, Jack
    Sikdar, Biplab
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 309 - 319
  • [35] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)
  • [36] Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices
    Vorakulpipat, Chalee
    Takahashi, Takeshi
    Rattanalerdnusorn, Ekkachan
    Thaenkaew, Phithak
    Inoue, Daisuke
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 279 - 282
  • [37] DAG blockchain-based lightweight authentication and authorization schemefor IoT devices
    Wang, Shangping
    Li, Huan
    Chen, Juanjuan
    Wang, Jifang
    Deng, Yingjuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [38] Distributed Ledger-Based Authentication and Authorization of IoT Devices in Federated Environments
    Jarosz, Michal
    Wrona, Konrad
    Zielinski, Zbigniew
    ELECTRONICS, 2024, 13 (19)
  • [39] Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device
    Wang, Dong
    Zhang, Xiaosong
    Ming, Jiang
    Chen, Ting
    Wang, Chao
    Niu, Weina
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [40] Visible Light Communication based Authentication Protocol Designed for Location based Network Connectivity
    Suduwella, Chathura P.
    Ranasinghe, Yohani S.
    de Zoysa, Kasun
    2017 17TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) - 2017, 2017, : 158 - +