Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30054
Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: Anonymity, authentication, Internet of Things, lightweight, untraceablity.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.2576974

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF

References:


[1] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of things: Vision, applications and research challenges," Ad Hoc Networks, vol. 10, pp. 1497-1516, 2012.
[2] K. Ashton, "That ‘internet of things’ thing," RFiD Journal, vol. 22, pp. 97-114, 2009.
[3] S. H. Shah and I. Yaqoob, "A survey: Internet of Things (IOT) technologies, applications and challenges," in Smart Energy Grid Engineering (SEGE), 2016 IEEE, 2016, pp. 381-385.
[4] E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier, and P. Kikiras, "On the Security and Privacy of Internet of Things Architectures and Systems," in Secure Internet of Things (SIoT), 2015 International Workshop on, 2015, pp. 49-57.
[5] P. Gope and T. Hwang, "Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks," Wireless Personal Communications, vol. 82, pp. 2231-2245, 2015.
[6] T. Hwang and P. Gope, "Provably secure mutual authentication and key agreement scheme with user anonymity," in Information, Communications and Signal Processing (ICICS) 2013 9th International Conference on, 2013, pp. 1-5.
[7] J. M. Kizza, "Computer Network Security Protocols," in Guide to Computer Network Security, ed: Springer, 2015, pp. 357-386.
[8] P. N. Mahalle, N. R. Prasad, and R. Prasad, "Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)," in Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on, 2014, pp. 1-5.
[9] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications," International Journal of Distributed Sensor Networks, vol. 2014, 2014.
[10] P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "Two-phase authentication protocol for wireless sensor networks in distributed IoT applications," in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, 2014, pp. 2728-2733.
[11] P. Gope and T. Hwang, "Untraceable sensor movement in distributed IoT infrastructure," Sensors Journal, IEEE, vol. 15, pp. 5340-5348, 2015.
[12] T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, "A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication," in Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on, 2012, pp. 956-963.
[13] D. A. Ha, K. T. Nguyen, and J. K. Zao, "Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol," in Proceedings of the Seventh Symposium on Information and Communication Technology, 2016, pp. 173-179.
[14] M.-C. Chuang and J.-F. Lee, "TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks," Systems Journal, IEEE, vol. 8, pp. 749-758, 2014.
[15] K. Srivastava, A. K. Awasthi, S. D. Kaul, and R. Mittal, "A hash based mutual RFID tag authentication protocol in telecare medicine information system," Journal of medical systems, vol. 39, p. 153, 2015.
[16] D.-Z. Sun and J.-D. Zhong, "Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol," Wireless Personal Communications, vol. 91, pp. 1085-1093, 2016.
[17] D. He and S. Zeadally, "An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography," IEEE Internet of Things Journal, vol. 2, pp. 72-83, 2015.