Skip to main content
Erschienen in:
Buchtitelbild

2023 | OriginalPaper | Buchkapitel

Secure Algorithm for IoT Devices Authentication

verfasst von : Vincent Omollo Nyangaresi, Anthony J. Rodrigues, Silvance O. Abeka

Erschienen in: Industry 4.0 Challenges in Smart Cities

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) security is a major concern owing to the sensitive data that flows in these networks. The fifth generation (5G) network provides high bandwidth, endearing it as an ideal underlying network for IoT communication. In addition, 5G can facilitate seamless integration of 2G, 3G, 4G, and WiFi to realize faster services, high capacity, and very short latencies. Although 5G features such as high bandwidth and seamless integration are ideal for IoT implementations, the underlying network is vulnerable to attacks such as eavesdropping, de-synchronization, sink hole, denial of service (DoS) and replay attacks, among others. To address these challenges, a number of protocols based on techniques such as elliptic curve cryptography (ECC), trusted authority, quantum cryptography, public keys, private keys, pseudonymous certificates, group handover authentication, multi-signature, and aggregate message authentication code (AMAC) technology have been proposed. Unfortunately, these protocols either have high computation and communication costs or do not provide robust security required for IoT devices communication. This renders them inefficient and susceptible to attacks such as impersonation, privacy and location sniffing, eavesdropping, session key disclosure attacks, modification, and insider attacks. Consequently, there is need for an efficient and secure key agreement and session authentication protocol for IoT deployments. In this paper, an efficient and secure handover protocol for IoT devices is proposed. The simulation results showed that this protocol exhibited lower computation and turnaround time, high stability, and moderate communications costs. It was also demonstrated to be robust against masquerading, packet replay, eavesdropping, free riding attacks, privacy and location sniffing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3GPP 5G networks. IEEE Commun Surv Tutorials 22(1):170–195 Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3GPP 5G networks. IEEE Commun Surv Tutorials 22(1):170–195
2.
Zurück zum Zitat Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the Internet of Things era: an overview on security and privacy challenges. Comput Netw 2020:107345CrossRef Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the Internet of Things era: an overview on security and privacy challenges. Comput Netw 2020:107345CrossRef
3.
Zurück zum Zitat Ferrag M, Maglaras L, Argyriou A, Kosmanos D, Janicke H (2018) Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl 101:55–82CrossRef Ferrag M, Maglaras L, Argyriou A, Kosmanos D, Janicke H (2018) Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl 101:55–82CrossRef
4.
Zurück zum Zitat Li S, Da Xu L, Zhao S (2018) 5g internet of things: a survey. J Ind Inf Integr 10:1–9 Li S, Da Xu L, Zhao S (2018) 5g internet of things: a survey. J Ind Inf Integr 10:1–9
5.
Zurück zum Zitat Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411CrossRef Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411CrossRef
6.
Zurück zum Zitat Boujelben M, Rejeb S, Tabbane S (2015) A novel green handover self-optimization algorithm for LTE-A/5G HetNets. In: 2015 international wireless communications and mobile computing conference (IWCMC). IEEE, Piscataway, pp 413–418CrossRef Boujelben M, Rejeb S, Tabbane S (2015) A novel green handover self-optimization algorithm for LTE-A/5G HetNets. In: 2015 international wireless communications and mobile computing conference (IWCMC). IEEE, Piscataway, pp 413–418CrossRef
7.
Zurück zum Zitat Cao J, Ma M, Li H, Zhang Y, Luo Z (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutorials 16(1):283–302CrossRef Cao J, Ma M, Li H, Zhang Y, Luo Z (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutorials 16(1):283–302CrossRef
8.
Zurück zum Zitat Saxena N, Grijalva S, Chaudhari NS (2016) Authentication protocol for an IoT-enabled LTE network. ACM Trans Internet Technol 16(4):1–20CrossRef Saxena N, Grijalva S, Chaudhari NS (2016) Authentication protocol for an IoT-enabled LTE network. ACM Trans Internet Technol 16(4):1–20CrossRef
9.
Zurück zum Zitat Torroglosa-Garcia EM, Calero JMA, Bernabe JB, Skarmeta A (2020) Enabling roaming across heterogeneous IoT wireless networks: LoRaWAN meets 5G. IEEE Access 2020:17 Torroglosa-Garcia EM, Calero JMA, Bernabe JB, Skarmeta A (2020) Enabling roaming across heterogeneous IoT wireless networks: LoRaWAN meets 5G. IEEE Access 2020:17
10.
Zurück zum Zitat Lai C, Lu R, Zheng D, Shen XS (2020) Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw 34(2):37–45CrossRef Lai C, Lu R, Zheng D, Shen XS (2020) Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw 34(2):37–45CrossRef
11.
Zurück zum Zitat Jo HJ, Kim IS, Lee DH (2018) Reliable cooperative authentication for vehicular networks. IEEE Trans Intell Transp Syst 19(4):1065–1079CrossRef Jo HJ, Kim IS, Lee DH (2018) Reliable cooperative authentication for vehicular networks. IEEE Trans Intell Transp Syst 19(4):1065–1079CrossRef
12.
Zurück zum Zitat Khan A, Abdullah J, Khan N, Julahi A, Tarmizi S (2017) Quantum-elliptic curve cryptography for multihop communication in 5g networks. IJCSNS 17(5):357–365 Khan A, Abdullah J, Khan N, Julahi A, Tarmizi S (2017) Quantum-elliptic curve cryptography for multihop communication in 5g networks. IJCSNS 17(5):357–365
13.
Zurück zum Zitat Eiza MH, Ni Q, Shi Q (2016) Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol 65(10):7868–7881CrossRef Eiza MH, Ni Q, Shi Q (2016) Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol 65(10):7868–7881CrossRef
14.
Zurück zum Zitat Mohseni-Ejiyeh A, Ashouri-Talouki M (2017) Sevr+: Secure and privacy-aware cloud-assisted video reporting service for 5g vehicular networks. In: Iranian conference on electrical engineering (ICEE). IEEE, Piscataway, pp 2159–2164 Mohseni-Ejiyeh A, Ashouri-Talouki M (2017) Sevr+: Secure and privacy-aware cloud-assisted video reporting service for 5g vehicular networks. In: Iranian conference on electrical engineering (ICEE). IEEE, Piscataway, pp 2159–2164
15.
Zurück zum Zitat Cao J, Li H, Ma M, Li F (2018) UPPGHA: uniform privacy preservation group handover authentication mechanism for mMTC in LTE-A networks. Secur Commun Netw 2018:1–16 Cao J, Li H, Ma M, Li F (2018) UPPGHA: uniform privacy preservation group handover authentication mechanism for mMTC in LTE-A networks. Secur Commun Netw 2018:1–16
16.
Zurück zum Zitat Cao J, Li H, Ma M, Li H (2017) G2RHA: group-to-route handover authentication scheme for mobile relays in LTE-A high-speed rail networks. IEEE Trans Veh Technol 66(11):9689–9701CrossRef Cao J, Li H, Ma M, Li H (2017) G2RHA: group-to-route handover authentication scheme for mobile relays in LTE-A high-speed rail networks. IEEE Trans Veh Technol 66(11):9689–9701CrossRef
17.
Zurück zum Zitat Cao J, Li H, Ma M (2015) GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 3020–3025CrossRef Cao J, Li H, Ma M (2015) GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 3020–3025CrossRef
18.
Zurück zum Zitat Cao J, Li H, Ma M, Li F (2015) UGHA: uniform group based handover authentication for MTC within E-UTRAN in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 7246–7251CrossRef Cao J, Li H, Ma M, Li F (2015) UGHA: uniform group based handover authentication for MTC within E-UTRAN in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 7246–7251CrossRef
19.
Zurück zum Zitat Kong Q, Lu R, Chen S, Zhu H (2017) Achieve secure handover session key management via mobile relay in LTE-advanced networks. IEEE Internet Things J 4(1):29–39 Kong Q, Lu R, Chen S, Zhu H (2017) Achieve secure handover session key management via mobile relay in LTE-advanced networks. IEEE Internet Things J 4(1):29–39
20.
Zurück zum Zitat Cao J, Ma M, Li H (2015) GBAAM: group-based access authentication for MTC in LTE networks. Secur Commun Netw 8(17):3282–3299CrossRef Cao J, Ma M, Li H (2015) GBAAM: group-based access authentication for MTC in LTE networks. Secur Commun Netw 8(17):3282–3299CrossRef
21.
Zurück zum Zitat Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417CrossRef Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417CrossRef
22.
Zurück zum Zitat Lai C, Li H, Lu R, Jiang R, Shen X (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: 2013 IEEE global communications conference (GLOBECOM). IEEE, Piscataway, pp 832–837 Lai C, Li H, Lu R, Jiang R, Shen X (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: 2013 IEEE global communications conference (GLOBECOM). IEEE, Piscataway, pp 832–837
23.
Zurück zum Zitat Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16CrossRef Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16CrossRef
24.
Zurück zum Zitat Cao J, Yu P, Ma M, Gao W (2018) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6:1561–1575CrossRef Cao J, Yu P, Ma M, Gao W (2018) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6:1561–1575CrossRef
25.
Zurück zum Zitat Xie P, Feng J, Cao Z, Wang J (2018) Genewave: fast authentication and key agreement on commodity mobile devices. IEEE/ACM Trans Networking 26(4):1688–1700CrossRef Xie P, Feng J, Cao Z, Wang J (2018) Genewave: fast authentication and key agreement on commodity mobile devices. IEEE/ACM Trans Networking 26(4):1688–1700CrossRef
26.
Zurück zum Zitat Chao SL, Lee HY, Chou CC, Wei HY (2013) Bio-inspired proximity discovery and synchronization for D2D communications. IEEE Commun Lett 17(12):2300–2303CrossRef Chao SL, Lee HY, Chou CC, Wei HY (2013) Bio-inspired proximity discovery and synchronization for D2D communications. IEEE Commun Lett 17(12):2300–2303CrossRef
27.
Zurück zum Zitat Huang PK, Qi E, Park M, Stephens A (2013) Energy efficient and scalable device-to-device discovery protocol with fast discovery. In: 2013 IEEE international workshop of Internet-of-Things networking and control (IoT-NC). IEEE, Piscataway, pp 1–9 Huang PK, Qi E, Park M, Stephens A (2013) Energy efficient and scalable device-to-device discovery protocol with fast discovery. In: 2013 IEEE international workshop of Internet-of-Things networking and control (IoT-NC). IEEE, Piscataway, pp 1–9
28.
Zurück zum Zitat Wang M, Yan Z, Niemi V (2017) UAKA-D2D: universal authentication and key agreement protocol in D2D communications. Mobile Netw Appl 22(3):510–525CrossRef Wang M, Yan Z, Niemi V (2017) UAKA-D2D: universal authentication and key agreement protocol in D2D communications. Mobile Netw Appl 22(3):510–525CrossRef
29.
Zurück zum Zitat Hsu RH, Lee J, Quek TQ, Chen JC (2018) GRAAD: group anonymous and accountable D2D communication in mobile networks. IEEE Trans Inf For Secur 13(2):449–464CrossRef Hsu RH, Lee J, Quek TQ, Chen JC (2018) GRAAD: group anonymous and accountable D2D communication in mobile networks. IEEE Trans Inf For Secur 13(2):449–464CrossRef
30.
Zurück zum Zitat Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Ind Inf 14(8):3637–3647CrossRef Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Ind Inf 14(8):3637–3647CrossRef
31.
Zurück zum Zitat Esfahani A, Mantas G, Matischek R (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6:288–296CrossRef Esfahani A, Mantas G, Matischek R (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6:288–296CrossRef
32.
Zurück zum Zitat Khemissa H, Tandjaoui D (2016) A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Wireless telecommunications symposium (WTS). IEEE, Piscataway Khemissa H, Tandjaoui D (2016) A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Wireless telecommunications symposium (WTS). IEEE, Piscataway
33.
Zurück zum Zitat Adil A, Mazhar A, Abdul NK, Tauqeer K, Faisal R, Yaser J, Junaid S (2019) A multi-attack resilient lightweight IoT authentication scheme. Trans Emerg Telecommun Technol 2019:1–15 Adil A, Mazhar A, Abdul NK, Tauqeer K, Faisal R, Yaser J, Junaid S (2019) A multi-attack resilient lightweight IoT authentication scheme. Trans Emerg Telecommun Technol 2019:1–15
Metadaten
Titel
Secure Algorithm for IoT Devices Authentication
verfasst von
Vincent Omollo Nyangaresi
Anthony J. Rodrigues
Silvance O. Abeka
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-030-92968-8_1

Neuer Inhalt