Skip to main content
main-content

Tipp

Weitere Kapitel dieses Buchs durch Wischen aufrufen

Erschienen in:
Buchtitelbild

2023 | OriginalPaper | Buchkapitel

Secure Algorithm for IoT Devices Authentication

verfasst von: Vincent Omollo Nyangaresi, Anthony J. Rodrigues, Silvance O. Abeka

Erschienen in: Industry 4.0 Challenges in Smart Cities

Verlag: Springer International Publishing

share
TEILEN

Abstract

Internet of Things (IoT) security is a major concern owing to the sensitive data that flows in these networks. The fifth generation (5G) network provides high bandwidth, endearing it as an ideal underlying network for IoT communication. In addition, 5G can facilitate seamless integration of 2G, 3G, 4G, and WiFi to realize faster services, high capacity, and very short latencies. Although 5G features such as high bandwidth and seamless integration are ideal for IoT implementations, the underlying network is vulnerable to attacks such as eavesdropping, de-synchronization, sink hole, denial of service (DoS) and replay attacks, among others. To address these challenges, a number of protocols based on techniques such as elliptic curve cryptography (ECC), trusted authority, quantum cryptography, public keys, private keys, pseudonymous certificates, group handover authentication, multi-signature, and aggregate message authentication code (AMAC) technology have been proposed. Unfortunately, these protocols either have high computation and communication costs or do not provide robust security required for IoT devices communication. This renders them inefficient and susceptible to attacks such as impersonation, privacy and location sniffing, eavesdropping, session key disclosure attacks, modification, and insider attacks. Consequently, there is need for an efficient and secure key agreement and session authentication protocol for IoT deployments. In this paper, an efficient and secure handover protocol for IoT devices is proposed. The simulation results showed that this protocol exhibited lower computation and turnaround time, high stability, and moderate communications costs. It was also demonstrated to be robust against masquerading, packet replay, eavesdropping, free riding attacks, privacy and location sniffing.
Literatur
1.
Zurück zum Zitat Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3GPP 5G networks. IEEE Commun Surv Tutorials 22(1):170–195 Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3GPP 5G networks. IEEE Commun Surv Tutorials 22(1):170–195
2.
Zurück zum Zitat Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the Internet of Things era: an overview on security and privacy challenges. Comput Netw 2020:107345 CrossRef Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the Internet of Things era: an overview on security and privacy challenges. Comput Netw 2020:107345 CrossRef
3.
Zurück zum Zitat Ferrag M, Maglaras L, Argyriou A, Kosmanos D, Janicke H (2018) Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl 101:55–82 CrossRef Ferrag M, Maglaras L, Argyriou A, Kosmanos D, Janicke H (2018) Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl 101:55–82 CrossRef
4.
Zurück zum Zitat Li S, Da Xu L, Zhao S (2018) 5g internet of things: a survey. J Ind Inf Integr 10:1–9 Li S, Da Xu L, Zhao S (2018) 5g internet of things: a survey. J Ind Inf Integr 10:1–9
5.
Zurück zum Zitat Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411 CrossRef Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411 CrossRef
6.
Zurück zum Zitat Boujelben M, Rejeb S, Tabbane S (2015) A novel green handover self-optimization algorithm for LTE-A/5G HetNets. In: 2015 international wireless communications and mobile computing conference (IWCMC). IEEE, Piscataway, pp 413–418 CrossRef Boujelben M, Rejeb S, Tabbane S (2015) A novel green handover self-optimization algorithm for LTE-A/5G HetNets. In: 2015 international wireless communications and mobile computing conference (IWCMC). IEEE, Piscataway, pp 413–418 CrossRef
7.
Zurück zum Zitat Cao J, Ma M, Li H, Zhang Y, Luo Z (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutorials 16(1):283–302 CrossRef Cao J, Ma M, Li H, Zhang Y, Luo Z (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutorials 16(1):283–302 CrossRef
8.
Zurück zum Zitat Saxena N, Grijalva S, Chaudhari NS (2016) Authentication protocol for an IoT-enabled LTE network. ACM Trans Internet Technol 16(4):1–20 CrossRef Saxena N, Grijalva S, Chaudhari NS (2016) Authentication protocol for an IoT-enabled LTE network. ACM Trans Internet Technol 16(4):1–20 CrossRef
9.
Zurück zum Zitat Torroglosa-Garcia EM, Calero JMA, Bernabe JB, Skarmeta A (2020) Enabling roaming across heterogeneous IoT wireless networks: LoRaWAN meets 5G. IEEE Access 2020:17 Torroglosa-Garcia EM, Calero JMA, Bernabe JB, Skarmeta A (2020) Enabling roaming across heterogeneous IoT wireless networks: LoRaWAN meets 5G. IEEE Access 2020:17
10.
Zurück zum Zitat Lai C, Lu R, Zheng D, Shen XS (2020) Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw 34(2):37–45 CrossRef Lai C, Lu R, Zheng D, Shen XS (2020) Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw 34(2):37–45 CrossRef
11.
Zurück zum Zitat Jo HJ, Kim IS, Lee DH (2018) Reliable cooperative authentication for vehicular networks. IEEE Trans Intell Transp Syst 19(4):1065–1079 CrossRef Jo HJ, Kim IS, Lee DH (2018) Reliable cooperative authentication for vehicular networks. IEEE Trans Intell Transp Syst 19(4):1065–1079 CrossRef
12.
Zurück zum Zitat Khan A, Abdullah J, Khan N, Julahi A, Tarmizi S (2017) Quantum-elliptic curve cryptography for multihop communication in 5g networks. IJCSNS 17(5):357–365 Khan A, Abdullah J, Khan N, Julahi A, Tarmizi S (2017) Quantum-elliptic curve cryptography for multihop communication in 5g networks. IJCSNS 17(5):357–365
13.
Zurück zum Zitat Eiza MH, Ni Q, Shi Q (2016) Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol 65(10):7868–7881 CrossRef Eiza MH, Ni Q, Shi Q (2016) Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol 65(10):7868–7881 CrossRef
14.
Zurück zum Zitat Mohseni-Ejiyeh A, Ashouri-Talouki M (2017) Sevr+: Secure and privacy-aware cloud-assisted video reporting service for 5g vehicular networks. In: Iranian conference on electrical engineering (ICEE). IEEE, Piscataway, pp 2159–2164 Mohseni-Ejiyeh A, Ashouri-Talouki M (2017) Sevr+: Secure and privacy-aware cloud-assisted video reporting service for 5g vehicular networks. In: Iranian conference on electrical engineering (ICEE). IEEE, Piscataway, pp 2159–2164
15.
Zurück zum Zitat Cao J, Li H, Ma M, Li F (2018) UPPGHA: uniform privacy preservation group handover authentication mechanism for mMTC in LTE-A networks. Secur Commun Netw 2018:1–16 Cao J, Li H, Ma M, Li F (2018) UPPGHA: uniform privacy preservation group handover authentication mechanism for mMTC in LTE-A networks. Secur Commun Netw 2018:1–16
16.
Zurück zum Zitat Cao J, Li H, Ma M, Li H (2017) G2RHA: group-to-route handover authentication scheme for mobile relays in LTE-A high-speed rail networks. IEEE Trans Veh Technol 66(11):9689–9701 CrossRef Cao J, Li H, Ma M, Li H (2017) G2RHA: group-to-route handover authentication scheme for mobile relays in LTE-A high-speed rail networks. IEEE Trans Veh Technol 66(11):9689–9701 CrossRef
17.
Zurück zum Zitat Cao J, Li H, Ma M (2015) GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 3020–3025 CrossRef Cao J, Li H, Ma M (2015) GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 3020–3025 CrossRef
18.
Zurück zum Zitat Cao J, Li H, Ma M, Li F (2015) UGHA: uniform group based handover authentication for MTC within E-UTRAN in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 7246–7251 CrossRef Cao J, Li H, Ma M, Li F (2015) UGHA: uniform group based handover authentication for MTC within E-UTRAN in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 7246–7251 CrossRef
19.
Zurück zum Zitat Kong Q, Lu R, Chen S, Zhu H (2017) Achieve secure handover session key management via mobile relay in LTE-advanced networks. IEEE Internet Things J 4(1):29–39 Kong Q, Lu R, Chen S, Zhu H (2017) Achieve secure handover session key management via mobile relay in LTE-advanced networks. IEEE Internet Things J 4(1):29–39
20.
Zurück zum Zitat Cao J, Ma M, Li H (2015) GBAAM: group-based access authentication for MTC in LTE networks. Secur Commun Netw 8(17):3282–3299 CrossRef Cao J, Ma M, Li H (2015) GBAAM: group-based access authentication for MTC in LTE networks. Secur Commun Netw 8(17):3282–3299 CrossRef
21.
Zurück zum Zitat Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417 CrossRef Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417 CrossRef
22.
Zurück zum Zitat Lai C, Li H, Lu R, Jiang R, Shen X (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: 2013 IEEE global communications conference (GLOBECOM). IEEE, Piscataway, pp 832–837 Lai C, Li H, Lu R, Jiang R, Shen X (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: 2013 IEEE global communications conference (GLOBECOM). IEEE, Piscataway, pp 832–837
23.
Zurück zum Zitat Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16 CrossRef Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16 CrossRef
24.
Zurück zum Zitat Cao J, Yu P, Ma M, Gao W (2018) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6:1561–1575 CrossRef Cao J, Yu P, Ma M, Gao W (2018) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6:1561–1575 CrossRef
25.
Zurück zum Zitat Xie P, Feng J, Cao Z, Wang J (2018) Genewave: fast authentication and key agreement on commodity mobile devices. IEEE/ACM Trans Networking 26(4):1688–1700 CrossRef Xie P, Feng J, Cao Z, Wang J (2018) Genewave: fast authentication and key agreement on commodity mobile devices. IEEE/ACM Trans Networking 26(4):1688–1700 CrossRef
26.
Zurück zum Zitat Chao SL, Lee HY, Chou CC, Wei HY (2013) Bio-inspired proximity discovery and synchronization for D2D communications. IEEE Commun Lett 17(12):2300–2303 CrossRef Chao SL, Lee HY, Chou CC, Wei HY (2013) Bio-inspired proximity discovery and synchronization for D2D communications. IEEE Commun Lett 17(12):2300–2303 CrossRef
27.
Zurück zum Zitat Huang PK, Qi E, Park M, Stephens A (2013) Energy efficient and scalable device-to-device discovery protocol with fast discovery. In: 2013 IEEE international workshop of Internet-of-Things networking and control (IoT-NC). IEEE, Piscataway, pp 1–9 Huang PK, Qi E, Park M, Stephens A (2013) Energy efficient and scalable device-to-device discovery protocol with fast discovery. In: 2013 IEEE international workshop of Internet-of-Things networking and control (IoT-NC). IEEE, Piscataway, pp 1–9
28.
Zurück zum Zitat Wang M, Yan Z, Niemi V (2017) UAKA-D2D: universal authentication and key agreement protocol in D2D communications. Mobile Netw Appl 22(3):510–525 CrossRef Wang M, Yan Z, Niemi V (2017) UAKA-D2D: universal authentication and key agreement protocol in D2D communications. Mobile Netw Appl 22(3):510–525 CrossRef
29.
Zurück zum Zitat Hsu RH, Lee J, Quek TQ, Chen JC (2018) GRAAD: group anonymous and accountable D2D communication in mobile networks. IEEE Trans Inf For Secur 13(2):449–464 CrossRef Hsu RH, Lee J, Quek TQ, Chen JC (2018) GRAAD: group anonymous and accountable D2D communication in mobile networks. IEEE Trans Inf For Secur 13(2):449–464 CrossRef
30.
Zurück zum Zitat Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Ind Inf 14(8):3637–3647 CrossRef Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Ind Inf 14(8):3637–3647 CrossRef
31.
Zurück zum Zitat Esfahani A, Mantas G, Matischek R (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6:288–296 CrossRef Esfahani A, Mantas G, Matischek R (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6:288–296 CrossRef
32.
Zurück zum Zitat Khemissa H, Tandjaoui D (2016) A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Wireless telecommunications symposium (WTS). IEEE, Piscataway Khemissa H, Tandjaoui D (2016) A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Wireless telecommunications symposium (WTS). IEEE, Piscataway
33.
Zurück zum Zitat Adil A, Mazhar A, Abdul NK, Tauqeer K, Faisal R, Yaser J, Junaid S (2019) A multi-attack resilient lightweight IoT authentication scheme. Trans Emerg Telecommun Technol 2019:1–15 Adil A, Mazhar A, Abdul NK, Tauqeer K, Faisal R, Yaser J, Junaid S (2019) A multi-attack resilient lightweight IoT authentication scheme. Trans Emerg Telecommun Technol 2019:1–15
Metadaten
Titel
Secure Algorithm for IoT Devices Authentication
verfasst von
Vincent Omollo Nyangaresi
Anthony J. Rodrigues
Silvance O. Abeka
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-030-92968-8_1