Skip to main content

Secure Algorithm for IoT Devices Authentication

  • 48 Accesses

Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)

Abstract

Internet of Things (IoT) security is a major concern owing to the sensitive data that flows in these networks. The fifth generation (5G) network provides high bandwidth, endearing it as an ideal underlying network for IoT communication. In addition, 5G can facilitate seamless integration of 2G, 3G, 4G, and WiFi to realize faster services, high capacity, and very short latencies. Although 5G features such as high bandwidth and seamless integration are ideal for IoT implementations, the underlying network is vulnerable to attacks such as eavesdropping, de-synchronization, sink hole, denial of service (DoS) and replay attacks, among others. To address these challenges, a number of protocols based on techniques such as elliptic curve cryptography (ECC), trusted authority, quantum cryptography, public keys, private keys, pseudonymous certificates, group handover authentication, multi-signature, and aggregate message authentication code (AMAC) technology have been proposed. Unfortunately, these protocols either have high computation and communication costs or do not provide robust security required for IoT devices communication. This renders them inefficient and susceptible to attacks such as impersonation, privacy and location sniffing, eavesdropping, session key disclosure attacks, modification, and insider attacks. Consequently, there is need for an efficient and secure key agreement and session authentication protocol for IoT deployments. In this paper, an efficient and secure handover protocol for IoT devices is proposed. The simulation results showed that this protocol exhibited lower computation and turnaround time, high stability, and moderate communications costs. It was also demonstrated to be robust against masquerading, packet replay, eavesdropping, free riding attacks, privacy and location sniffing.

Keywords

  • Handover
  • IoT
  • Latency
  • Packet loss
  • Ping pong
  • Security
  • Authentication

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-92968-8_1
  • Chapter length: 22 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   169.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-92968-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   219.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

References

  1. Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3GPP 5G networks. IEEE Commun Surv Tutorials 22(1):170–195

    Google Scholar 

  2. Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the Internet of Things era: an overview on security and privacy challenges. Comput Netw 2020:107345

    CrossRef  Google Scholar 

  3. Ferrag M, Maglaras L, Argyriou A, Kosmanos D, Janicke H (2018) Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes. J Netw Comput Appl 101:55–82

    CrossRef  Google Scholar 

  4. Li S, Da Xu L, Zhao S (2018) 5g internet of things: a survey. J Ind Inf Integr 10:1–9

    Google Scholar 

  5. Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411

    CrossRef  Google Scholar 

  6. Boujelben M, Rejeb S, Tabbane S (2015) A novel green handover self-optimization algorithm for LTE-A/5G HetNets. In: 2015 international wireless communications and mobile computing conference (IWCMC). IEEE, Piscataway, pp 413–418

    CrossRef  Google Scholar 

  7. Cao J, Ma M, Li H, Zhang Y, Luo Z (2014) A survey on security aspects for LTE and LTE-A networks. IEEE Commun Surv Tutorials 16(1):283–302

    CrossRef  Google Scholar 

  8. Saxena N, Grijalva S, Chaudhari NS (2016) Authentication protocol for an IoT-enabled LTE network. ACM Trans Internet Technol 16(4):1–20

    CrossRef  Google Scholar 

  9. Torroglosa-Garcia EM, Calero JMA, Bernabe JB, Skarmeta A (2020) Enabling roaming across heterogeneous IoT wireless networks: LoRaWAN meets 5G. IEEE Access 2020:17

    Google Scholar 

  10. Lai C, Lu R, Zheng D, Shen XS (2020) Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw 34(2):37–45

    CrossRef  Google Scholar 

  11. Jo HJ, Kim IS, Lee DH (2018) Reliable cooperative authentication for vehicular networks. IEEE Trans Intell Transp Syst 19(4):1065–1079

    CrossRef  Google Scholar 

  12. Khan A, Abdullah J, Khan N, Julahi A, Tarmizi S (2017) Quantum-elliptic curve cryptography for multihop communication in 5g networks. IJCSNS 17(5):357–365

    Google Scholar 

  13. Eiza MH, Ni Q, Shi Q (2016) Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol 65(10):7868–7881

    CrossRef  Google Scholar 

  14. Mohseni-Ejiyeh A, Ashouri-Talouki M (2017) Sevr+: Secure and privacy-aware cloud-assisted video reporting service for 5g vehicular networks. In: Iranian conference on electrical engineering (ICEE). IEEE, Piscataway, pp 2159–2164

    Google Scholar 

  15. Cao J, Li H, Ma M, Li F (2018) UPPGHA: uniform privacy preservation group handover authentication mechanism for mMTC in LTE-A networks. Secur Commun Netw 2018:1–16

    Google Scholar 

  16. Cao J, Li H, Ma M, Li H (2017) G2RHA: group-to-route handover authentication scheme for mobile relays in LTE-A high-speed rail networks. IEEE Trans Veh Technol 66(11):9689–9701

    CrossRef  Google Scholar 

  17. Cao J, Li H, Ma M (2015) GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 3020–3025

    CrossRef  Google Scholar 

  18. Cao J, Li H, Ma M, Li F (2015) UGHA: uniform group based handover authentication for MTC within E-UTRAN in LTE-A networks. In: 2015 IEEE international conference on communications (ICC). IEEE, Piscataway, pp 7246–7251

    CrossRef  Google Scholar 

  19. Kong Q, Lu R, Chen S, Zhu H (2017) Achieve secure handover session key management via mobile relay in LTE-advanced networks. IEEE Internet Things J 4(1):29–39

    Google Scholar 

  20. Cao J, Ma M, Li H (2015) GBAAM: group-based access authentication for MTC in LTE networks. Secur Commun Netw 8(17):3282–3299

    CrossRef  Google Scholar 

  21. Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417

    CrossRef  Google Scholar 

  22. Lai C, Li H, Lu R, Jiang R, Shen X (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: 2013 IEEE global communications conference (GLOBECOM). IEEE, Piscataway, pp 832–837

    Google Scholar 

  23. Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16

    CrossRef  Google Scholar 

  24. Cao J, Yu P, Ma M, Gao W (2018) Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J 6:1561–1575

    CrossRef  Google Scholar 

  25. Xie P, Feng J, Cao Z, Wang J (2018) Genewave: fast authentication and key agreement on commodity mobile devices. IEEE/ACM Trans Networking 26(4):1688–1700

    CrossRef  Google Scholar 

  26. Chao SL, Lee HY, Chou CC, Wei HY (2013) Bio-inspired proximity discovery and synchronization for D2D communications. IEEE Commun Lett 17(12):2300–2303

    CrossRef  Google Scholar 

  27. Huang PK, Qi E, Park M, Stephens A (2013) Energy efficient and scalable device-to-device discovery protocol with fast discovery. In: 2013 IEEE international workshop of Internet-of-Things networking and control (IoT-NC). IEEE, Piscataway, pp 1–9

    Google Scholar 

  28. Wang M, Yan Z, Niemi V (2017) UAKA-D2D: universal authentication and key agreement protocol in D2D communications. Mobile Netw Appl 22(3):510–525

    CrossRef  Google Scholar 

  29. Hsu RH, Lee J, Quek TQ, Chen JC (2018) GRAAD: group anonymous and accountable D2D communication in mobile networks. IEEE Trans Inf For Secur 13(2):449–464

    CrossRef  Google Scholar 

  30. Wang M, Yan Z (2018) Privacy-preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Ind Inf 14(8):3637–3647

    CrossRef  Google Scholar 

  31. Esfahani A, Mantas G, Matischek R (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6:288–296

    CrossRef  Google Scholar 

  32. Khemissa H, Tandjaoui D (2016) A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Wireless telecommunications symposium (WTS). IEEE, Piscataway

    Google Scholar 

  33. Adil A, Mazhar A, Abdul NK, Tauqeer K, Faisal R, Yaser J, Junaid S (2019) A multi-attack resilient lightweight IoT authentication scheme. Trans Emerg Telecommun Technol 2019:1–15

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vincent Omollo Nyangaresi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O. (2023). Secure Algorithm for IoT Devices Authentication. In: Cagáňová, D., Horňáková, N. (eds) Industry 4.0 Challenges in Smart Cities. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-92968-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-92968-8_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-92967-1

  • Online ISBN: 978-3-030-92968-8

  • eBook Packages: EngineeringEngineering (R0)