ABSTRACT
In this paper, we propose a novel continuous authentication protocol for the Internet of Things based on secret sharing scheme. This protocol provides secure and efficient authentication for frequent message transmissions in short session time intervals. The protocol introduces a novel use of secret sharing scheme, that is, the secret is used as an authenticator and the shares are used as authenticator tokens. Each token is an outcome of a function of time that binds the secret share to a specific point in time during the session such that the share can only be revealed in that specific time. The share can be linked back to the secret and, hence, the message source can be authenticated. Security evaluation of the protocol shows that it fulfills the stated security requirements and addresses the listed attacks. Performance evaluation of the protocol shows that it is lightweight in terms of computation and communication costs, thus addressing the resource-constrained IoT endpoints.
- Yao, X., Han, X., X., Du, X.. 2013. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications. IEEE Sensors Journal, vol. 13, no. 10, 3693--3701.Google ScholarCross Ref
- Dlodlo, N. 2012. Adopting the internet of things technologies in environmental management in South Africa. In Proceedings of the 2nd International Conference on Environment Science and Engineering, 45--55.Google Scholar
- Li, J., Wu, X., and Chen, H. 2011. Research on mobile digital health system based on internet of things, Electrical Power Systems and Computers (Lecture Notes in Electrical Engineering), vol. 99, Springer-Verlag, 495--502.Google Scholar
- Wang, Z. 2014. Smart Home System Design Based on Internet of Things. Applied Mechanics and Materials, vols. 602-605, 3808--3812.Google Scholar
- Roman, R., Zhou, J., Lopez, J. 2013. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol. 57, 2266--2279. Google ScholarDigital Library
- Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini, A. 2015. Security, Privacy and Trust in Internet of Things: The Road Ahead. Computer Networks, vol. 76, 146--164. Google ScholarDigital Library
- Wang, K., Bao, J., Wu, M., and Lu, W. 2010. Research on Security Management for Internet of Things. In Proceedings of 2010 International Conference on Computer Application and System Modeling, 133--137.Google Scholar
- Sarma, A. and Girao, J. 2009. Identities in the future Internet of Things. Wireless Personal Communications, vol. 49, no. 3, 353--363. Google ScholarDigital Library
- Turkanovic, M., Brumen, B., Holbl, M. 2014. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, vol. 20, 96--112.Google ScholarCross Ref
- Xu, D. and Chen, Y. 2013. A Safe RFID Authentication Protocol for Internet of Things. Journal of Theoretical and Applied Information Technology, vol. 48, no. 1, 359--364.Google Scholar
- Ye, N., Zhu, Y., Wang, R., Malekian, R., Qiao-min, L. 2014. An Efficient Authentication and Access Control Scheme for Perception Layer on Internet of Things, Applied Mathematics & Information Sciences, vol. 8, no. 4, 1617--1624.Google ScholarCross Ref
- Hernandez-Goya, M. C., and Caballero-Gill, P. 2013. Analysis of Lightweight Cryptographic Solutions for Authentication in IoT, In Proceedings of EUROCAST 2013, Part II, LNCS 8112, 373--380.Google Scholar
- Xiao, J. and Chen, C. 2012. Authentication and Access Control in the Internet of Things. In Proceedings of 32nd International Conference on Distributed Computing Systems Workshops, 588--592. Google ScholarDigital Library
- Mahalle, N., Prasad, N., Prasad, R. 2013. Novel Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT). In Proceedings of the Seventh IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS).Google Scholar
- Ndibanje, B., Lee, H., Lee, S. 2014. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors, vol. 14, 14786--14805.Google ScholarCross Ref
- Roman, R. Zhou, J., Lopez, J. 2013. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol. 57, 2266--2279. Google ScholarDigital Library
- Shamir, A. 1979. How to Share a Secret, Communications of the ACM, vol. 22, no. 11, 612--613. Google ScholarDigital Library
- NIST, 2008. (FIPS 180-3) Secure Hash Standard (shs).Google Scholar
- ISO/IEC 9797. "Information technology -- security techniques -- Message Authentication Code (MACs). Part 1: Mechanisms using a block cipher", 1999, "Part 2: Mechanisms using a dedicated hash-function", 2002.Google Scholar
- Yavuz, A. A. 2014. An efficient real-time broadcast authentication scheme for command and control messages', IEEE Transactions on Information Forensic and Security, vol. 9, no. 10, 1733--1742. Google ScholarDigital Library
- Bonetto, R., Bui, N., Lakkaundi, V., Olivereau, A., Serbanati, A., Rossi, M. 2012. Secure Communication for Smart IoT Objects: protocol STACKS, Use Cases and Practical Examples, In Proceedings of IEEE International Symposium on a world of wireless, mobile and multimedia networks (WoWMoM), 1--7.Google ScholarCross Ref
- Liu, Y., Qin, X., Wang, C., Li, B. 2013.A lightweight RFID authentication protocol based one elliptic curve cryptography, Journal of Computers, vol. 8, no. 11, 2880--2887.Google ScholarCross Ref
- Lee, J-Y., Lin, W-C., Huang, Y-H. 2014. A lightweight authentication protocol for internet of things. In Proceedings of 2014 International Symposium on Next- Generation Electronics ISNE, 1--2.Google ScholarCross Ref
- Braun, M., Hess, E., Meyer, B. 2008. Using Elliptic Curves on RFID Tags, IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 2, 1--9.Google Scholar
- Ahamed, S. Rahman, F., Hoque, E. 2008. ERAP: ECC based RFID Authentication Protocol, In Proceedings of 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 219--225. Google ScholarDigital Library
- Zhao, G., Si, X.., Wang, J., Long, X. M and Hu, T. 2011. A Novel Mutual Authentication Scheme for Internet of Things, In Proceedings of 2011 IEEE International Conference on Modeling, Identification and Control (ICMIC), 563--566.Google Scholar
- Park, N., Kim, M., Bang, H. 2015. Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT Environment, Computer Science and its Applications, Lecture Notes in Electrical Engineering, Vol. 330, 379--384.Google ScholarCross Ref
- Gao, D., Guo, Y. G., Cui, J. Q., Hao, H. G., Shi, H. 2012. A Communication Protocol of RFID Systems in Internet of Things, International Journal of Security and its Applications, vol. 6, no. 2, 91--102.Google Scholar
- Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G. 2013. DTLS based Security and Two-Way Authentication for the Internet of Things, Ad Hoc Networks, vol. 11, no. 8, 2710--2723. Google ScholarDigital Library
- Datagram Transport Layer Seurity (DTLS) 1.2 profile for Internet o Things', available at https://tools.ietf.org/html/draft-ietf-dice-profile-06.Google Scholar
- Potlapally, N., Ravi, S., Raghunathan, A., Jha, N. 2003. Analyzing the Energy Consumption of Security Protocols. In Proceedings of the 2003 International Symposium on Low Power Electronics and Design ISLPED' 03. Google ScholarDigital Library
Index Terms
- Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme
Recommendations
New Features of Authentication Scheme for the IoT: A Survey
IoT S&P'19: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-ThingsWith the development of cloud computing and artificial intelligence, the Internet of Things (IoT) products are gradually entering every corner of our lives and changing the way we live. Yet traditional computer authentication protocol cannot be used ...
An information security analysis method of Internet of things based on balanced double SVM
Special section: Recent trends, Challenges and Applications in Cognitive Computing for Intelligent SystemsWith the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things ...
Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
Condition proxy re-encryption is a promising security primitive for pervasive data sharing in such settings as cloud-based social networks and collaborations. However, it is challenging to create a secure condition proxy re-encryption scheme that is ...
Comments