Abstract
Recently, the Internet of Things (IoT) has emerged as one of the building blocks of future digital industrial technologies. Along with its huge open opportunities, it is also coming with different challenges, in which security issues are especially getting more and more attention. The resource constraints of IoT devices makes them even more difficult for us to develop secure authentication protocols that can be actually applied in practice. In this paper, we propose an extended authentication scheme which not only provides a centralized management from powerful servers to lower the burden on the device ends, but also allows direct connections between devices in the same networks. Computations in the proposed protocol are designed to use Elliptic Curve Cryptography (ECC) and only low-cost operations such as exclusive-or, concatenation, and hash function to provide efficient resource consumption. This study includes our security analysis which proves the proposed scheme is resilient to common attacks to IoT systems. The performance analysis is also given to show that it is applicable for practical applications as the process only consumes at most 38.2 mJ on each device in addition to the amount required by the original protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ashton, K.: That “Internet of Things” thing. RFID J. 2(5), 97–114 (2009)
IHS. n.d. Number of Internet of Things (IoT) devices connected worldwide in 2017 and 2018, by selected type (in millions), Statista. https://www.statista.com/statistics/789615/worldwide-connected-iot-devices-by-type/. Accessed 22 Nov 2018
IHS. n.d. Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (in billions), Statista. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. Accessed 22 Nov 2018
LeHong, H., Velosa, A.: Hype cycle for the internet of things. Gartner Group, 21 (2014)
Zhou, Q, Zhang, J.: Research prospect of Internet of Things geography. In: 19th International Conference on Geoinformatics 2011, pp. 1–5. IEEE (2011)
Yu, Y., Wang, J., Zhou, G.: The exploration in the education of professionals in applied Internet of Things engineering. In: 4th International Conference on Distance Learning and Education, pp. 74–77. IEEE (2010)
Desai, P., Sheth, A., Anantharam, P.: Semantic gateway as a service architecture for IoT interoperability. In: International Conference on Mobile Services, pp. 313–319. IEEE (2015)
Oren, Y., Keromytis, A.D.: From the aether to the ethernet-attacking the internet using broadcast digital television. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 353–368 (2014)
Cesare, S.: Breaking the security of physical devices. Talk at Blackhat, 14 (2014)
Liang, L., Zheng, K., Sheng, Q., Huang, X.: A denial of service attack method for an IoT system. In: 8th International Conference on Information Technology in Medicine and Education, pp. 360–364. IEEE (2016)
Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., Kikiras, P.: On the security and privacy of internet of things architectures and systems. In: 2015 International Workshop on Secure Internet of Things, pp. 49–57. IEEE (2015)
Alkurd, R., Shubair, R.M., Abualhaol, I.: Survey on device-to-device communications: challenges and design issues. In: 12th International New Circuits and Systems Conference (NEWCAS), pp. 361–364. IEEE (2014)
Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 32, 17–31 (2015)
Nguyen, T.A.T., Dang, T.K.: Enhanced security in internet voting protocol using blind signature and dynamic ballots. Electron. Commer. Res. 13(3), 257–272 (2013)
Tran, K.K., Pham, M.K., Dang, T.K.: A light-weight tightening authentication scheme for the objects’ encounters in the meetings. In: Dang, T.K., Küng, J., Wagner, R., Thoai, N., Takizawa, M. (eds.) FDSE 2018. LNCS, vol. 11251, pp. 83–102. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03192-3_8
Nechvatal, J.: Public key cryptography. In: Simmons, G. (ed.) Contemporary Cryptology: The Science of Information Integrity. IEEE (1992)
Dierks, T., Allen, C.: The TLS protocol version 1.0 (1999)
Rescorla, E., Modadugu, N.: Datagram transport layer security (2006)
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: 37th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 956–963. IEEE (2012)
Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization (No. MIT/LCS/TR-212), Massachusetts Institiute of Technology Cambridge Laboratory for Computer Science (1979)
He, D., Zeadally, S.: An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography. IEEE IoT J. 2(1), 72–83 (2014)
Chaudhry, S.A., Farash, M.S., Naqvi, H., Sher, M.: A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res. 16(1), 113–139 (2016)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28632-5_9
Chang, S.M., Shieh, S., Lin, W.W., Hsieh, C.M.: An efficient broadcast authentication scheme in wireless sensor networks. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 311–320. ACM (2006)
Khemissa, H., Tandjaoui, D., Bouzefrane, S.: An ultra-lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Bouzefrane, S., Banerjee, S., Sailhan, F., Boumerdassi, S., Renault, E. (eds.) MSPN 2017. LNCS, vol. 10566, pp. 49–62. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67807-8_4
Wang, K.H., Chen, C.M., Fang, W., Wu, T.Y.: A secure authentication scheme for Internet of Things. Pervasive Mobile Comput. 42, 15–26 (2017)
Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mobile Comput. 24, 210–223 (2015)
Chang, C.C., Wu, H.L., Sun, C.Y.: Notes on “Secure authentication scheme for IoT and cloud servers”. Pervasive Mobile Comput. 38, 275–278 (2017)
De Meulenaer, G., Gosset, F., Standaert, F.X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 580–585. IEEE (2008)
Kausar, F., Hussain, S., Park, J.H., Masood, A.: Secure group communication with self-healing and rekeying in wireless sensor networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 737–748. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77024-4_67
Thi, Q.N.T., Si, T.T., Dang, T.K.: Fine grained attribute based access control model for privacy protection. In: Dang, T.K., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2016. LNCS, vol. 10018, pp. 305–316. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-48057-2_21
Nguyen, T.A.T., Dang, T.K.: Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server. IET Biometrics 8(1), 79–91 (2018)
Dang, T.K., Tran, K.T.: The meeting of acquaintances: a cost-efficient authentication scheme for light-weight objects with transient trust level and plurality approach. Secur. Commun. Netw. 2019, 18 (2019)
Acknowledgement
This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under grant number B2018-20-08. We also thank other members of the project, specially PhD candidates: Tran Tri Dang, Ai Thao Nguyen Thi, and Que-Nguyet Tran Thi, for their meaningful help and comments during this paper preparation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Pham, C.D.M., Nguyen, T.L.P., Dang, T.K. (2019). Resource-Constrained IoT Authentication Protocol: An ECC-Based Hybrid Scheme for Device-to-Server and Device-to-Device Communications. In: Dang, T., Küng, J., Takizawa, M., Bui, S. (eds) Future Data and Security Engineering. FDSE 2019. Lecture Notes in Computer Science(), vol 11814. Springer, Cham. https://doi.org/10.1007/978-3-030-35653-8_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-35653-8_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-35652-1
Online ISBN: 978-3-030-35653-8
eBook Packages: Computer ScienceComputer Science (R0)