Skip to main content

2019 | OriginalPaper | Buchkapitel

A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things

verfasst von : Yong Wang, Yang Du, Jia Lou, Bei Gong

Erschienen in: Trusted Computing and Information Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trusted access to the Internet of Things sensing layer node is the precondition for the trusted operation of the Internet of Things. How to quickly and accurately implement identity authentication of a sensing node is currently a research hotspot. After comprehensive consideration of the security requirements and functional requirements of the sensing Node Identity Authentication, this paper proposes a fast identity authentication scheme for sensing nodes. In the identification process of sensing nodes, the data aggregation node is responsible for the selection of system parameters and the registration of sensing nodes. It does not directly participate in the authentication process and simplifies the authentication process. The computational efficiency is high, and the security analysis shows that the scheme has forward security and can resist malicious attacks such as replay attacks, key information disclosure attacks, and forgery attacks. Also, the solution supports key updates. Computational complexity analysis shows that this protocol uses only a small amount of computational complexity in exchange for higher security and more features.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Georgakopoulos, D., Jayaraman, P.P.: Internet of Things: from internet scale sensing to smart services. Computing 98(10), 1041–1058 (2016)MathSciNetCrossRef Georgakopoulos, D., Jayaraman, P.P.: Internet of Things: from internet scale sensing to smart services. Computing 98(10), 1041–1058 (2016)MathSciNetCrossRef
2.
Zurück zum Zitat Venkatesh, J., Aksanli, B., Chan, C.S., Akyurek, A.S., Rosing, T.S.: Scalable-application design for the IoT. IEEE Softw. 34(1), 62–70 (2017)CrossRef Venkatesh, J., Aksanli, B., Chan, C.S., Akyurek, A.S., Rosing, T.S.: Scalable-application design for the IoT. IEEE Softw. 34(1), 62–70 (2017)CrossRef
3.
Zurück zum Zitat Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)CrossRef Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)CrossRef
4.
Zurück zum Zitat Romana, R., Zhoua, J., Lopezb, J.: On the features and challenges of security & privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013)CrossRef Romana, R., Zhoua, J., Lopezb, J.: On the features and challenges of security & privacy in distributed Internet of Things. Comput. Netw. 57(10), 2266–2279 (2013)CrossRef
5.
Zurück zum Zitat Ntalianis, K., Tsapatsoulis, N.: Remote authentication via biometrics: a robust video-object steganographic mechanism over wireless networks. IEEE Trans. Emerg. Top. Comput. 4(1), 156–174 (2016)CrossRef Ntalianis, K., Tsapatsoulis, N.: Remote authentication via biometrics: a robust video-object steganographic mechanism over wireless networks. IEEE Trans. Emerg. Top. Comput. 4(1), 156–174 (2016)CrossRef
6.
Zurück zum Zitat Mosenia, A., Jha, N.K.: A comprehensive study of security of Internet-of-Things. Emerg. Top. Comput. 5(4), 586–602 (2017)CrossRef Mosenia, A., Jha, N.K.: A comprehensive study of security of Internet-of-Things. Emerg. Top. Comput. 5(4), 586–602 (2017)CrossRef
7.
Zurück zum Zitat Dao, N.-N., Kim, Y., Jeong, S., Park, M., Cho, S.: Achievable multi-security levels for lightweight IoT-enabled devices in infrastructure less peer-aware communications. IEEE Access 5(3), 26743–26753 (2017)CrossRef Dao, N.-N., Kim, Y., Jeong, S., Park, M., Cho, S.: Achievable multi-security levels for lightweight IoT-enabled devices in infrastructure less peer-aware communications. IEEE Access 5(3), 26743–26753 (2017)CrossRef
8.
Zurück zum Zitat Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., Wehrle, K.: Towards viable certificate-based authentication for the Internet of Things. In: Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, HotWiSec 2013, pp. 37–42 (2013) Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., Wehrle, K.: Towards viable certificate-based authentication for the Internet of Things. In: Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, HotWiSec 2013, pp. 37–42 (2013)
9.
Zurück zum Zitat Crescenzo, G., Zhang, T., Pietrowicz, S.: Anonymity notions for public-key infrastructures in mobile vehicular networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–6 (2007) Crescenzo, G., Zhang, T., Pietrowicz, S.: Anonymity notions for public-key infrastructures in mobile vehicular networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, pp. 1–6 (2007)
10.
Zurück zum Zitat Raya, M., Papadimitratos, P., Hubaux, J.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef Raya, M., Papadimitratos, P., Hubaux, J.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)CrossRef
12.
Zurück zum Zitat Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of anonymity in VANETs-putting pseudonymity into practice. In: IEEE Wireless Communications and Networking Conference, pp. 3400–3405 (2007) Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of anonymity in VANETs-putting pseudonymity into practice. In: IEEE Wireless Communications and Networking Conference, pp. 3400–3405 (2007)
13.
Zurück zum Zitat Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)CrossRef Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)CrossRef
14.
Zurück zum Zitat Juels, A., Rivest, R.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 103–111 (2003) Juels, A., Rivest, R.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 103–111 (2003)
15.
Zurück zum Zitat Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in Internet of Things. In: Wireless VITAE 2013, pp. 1–5 (2013) Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in Internet of Things. In: Wireless VITAE 2013, pp. 1–5 (2013)
16.
Zurück zum Zitat Abbas, R., Shirvanimoghaddam, M., Li, Y., Vucetic, B.: Random access for M2M communications with QoS guarantees. IEEE Trans. Commun 65(7), 2889–2903 (2017)CrossRef Abbas, R., Shirvanimoghaddam, M., Li, Y., Vucetic, B.: Random access for M2M communications with QoS guarantees. IEEE Trans. Commun 65(7), 2889–2903 (2017)CrossRef
17.
Zurück zum Zitat Li, Y., Chai, K., Chen, Y., Loo, J.: Distributed access control framework for IPv6-based hierarchical Internet of Things. IEEE Wirel. Commun. 16(10), 17–23 (2016)CrossRef Li, Y., Chai, K., Chen, Y., Loo, J.: Distributed access control framework for IPv6-based hierarchical Internet of Things. IEEE Wirel. Commun. 16(10), 17–23 (2016)CrossRef
18.
Zurück zum Zitat Chen, I.-R., Bao, F., Guo, J.: Trust-based service management for social Internet of Things systems. IEEE Trans. Dependable Secure Comput. 13(6), 684–696 (2016)CrossRef Chen, I.-R., Bao, F., Guo, J.: Trust-based service management for social Internet of Things systems. IEEE Trans. Dependable Secure Comput. 13(6), 684–696 (2016)CrossRef
19.
Zurück zum Zitat Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE Trans. Inf. Forensics Secur. 9(12), 2302–2313 (2014)CrossRef Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient generic framework for three-factor authentication with provably secure instantiation. IEEE Trans. Inf. Forensics Secur. 9(12), 2302–2313 (2014)CrossRef
20.
Zurück zum Zitat Gasti, P., Šeděnka, J., Yang, Q., Zhou, G., Balagani, K.S.: Secure, fast, and energy-efficient outsourced authentication for smartphones. IEEE Trans. Inf. Forensics Secur. 11(11), 2556–2571 (2016)CrossRef Gasti, P., Šeděnka, J., Yang, Q., Zhou, G., Balagani, K.S.: Secure, fast, and energy-efficient outsourced authentication for smartphones. IEEE Trans. Inf. Forensics Secur. 11(11), 2556–2571 (2016)CrossRef
21.
Zurück zum Zitat Liang, T., Chen, J.: Remote attestation project of the running environment of the trusted terminal. J. Softw. 25(6), 1273–1290 (2014) Liang, T., Chen, J.: Remote attestation project of the running environment of the trusted terminal. J. Softw. 25(6), 1273–1290 (2014)
Metadaten
Titel
A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things
verfasst von
Yong Wang
Yang Du
Jia Lou
Bei Gong
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-5913-2_15