Abstract
To ensure secure access to the data held in internet of things, many lightweight authentication schemes have been developed using approaches such as symmetric cryptography or hashing operations. Although these schemes achieve forward key secrecy and user anonymity, de-synchronization is a major problem in these protocols. As such, many other schemes have been presented to address this pertinent security challenge. However, some of these schemes are still susceptible to smart card loss attacks among others. In this paper, stochastic security ephemeral generation protocol for 5G enabled internet of things is presented. It is demonstrated to offer mutual authentication and session key agreement. It is also robust against packet replays, eavesdropping and man-in-the-middle attacks. In terms of performance, it has the lowest computation and communication overheads.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12, 1874–1884 (2017)
Shin, S., Kwon, T.: A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access 8, 67555–67571 (2020)
Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103, 194–204 (2018)
Nyangaresi, V.O., Affane Moundounga, A.R.: Secure data exchange scheme for smart grids. In: 2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI), pp. 312–316. IEEE, Naples (2021)
Kumar, D., Singh, H.K., Ahlawat, C.: A secure three-factor authentication scheme for wireless sensor networks using ECC. J. Discrete Math. Sci. Cryptogr. 23(4), 879–900 (2020)
Pundir, S., Wazid, M., Singh, D.P., Das, A.K., Rodrigues, J.J., Park, Y.: Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: survey and future challenges. IEEE Access 8, 3343–3363 (2019)
Amin, R., Islam, S.H., Kumar, N., Choo, K.K.R.: An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J. Netw. Comput. Appl. 104, 133–144 (2018)
Nyangaresi, V.O., Ogundoyin, S.O.: Certificate based authentication scheme for smart homes. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 202–207. IEEE, Antalya (2021)
Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 15(9), 4957–4968 (2019)
Nyangaresi, V.O.: Lightweight key agreement and authentication protocol for smart homes. In: 2021 IEEE AFRICON, pp. 1–6. IEEE, Arusha (2021)
Zhu, H., Tan, Y.A., Zhu, L., Wang, X., Zhang, Q., Li, Y.: An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors 18(5), 1–15 (2018)
Nyangaresi, V.O., Alsamhi, S.H.: Towards secure traffic signaling in smart grids. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 196–201. IEEE, Antalya (2021)
Karakaya, A., Akleylek, S.: A survey on security threats and authentication approaches in wireless sensor networks. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4. IEEE, Antalya (2018)
Nyangaresi, V.: Hardware assisted protocol for attacks prevention in ad hoc networks. In: Miraz, M.H., Southall, G., Ali, M., Ware, A., Soomro, S. (eds.) iCETiC 2021. LNICSSITE, vol. 395, pp. 3–20. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90016-8_1
Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for Internet of Things: a comprehensive survey. Secur. Commun. Network 2017, 1–41 (2017)
Nyangaresi, V., Rodrigues, A., Taha, N.: Mutual authentication protocol for secure VANET data exchanges. In: Perakovic, D., Knapcikova, L. (eds.) FABULOUS 2021. LNICSSITE, vol. 382, pp. 58–76. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78459-1_5
Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Futur. Gener. Comput. Syst. 78, 956–963 (2018)
Sureshkumar, C., Sabena, S.: Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks. Wireless Pers. Commun. 112(3), 1517–1536 (2020)
Nyangaresi, V.O., Petrovic, N.: Efficient PUF based authentication protocol for internet of drones. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021)
Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)
Nyangaresi, V.O., Mohammad, Z.: Privacy preservation protocol for smart grid networks. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021)
Xiong, L., Xiong, N., Wang, C., Yu, X., Shuai, M.: An efficient lightweight authentication scheme with adaptive resilience of asynchronization attacks for wireless sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 51(9), 5626–5638 (2019)
Park, Y., Park, Y.: Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12), 2123 (2016)
Wang, C., Xu, G., Sun, J.: An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12), 2946 (2017)
Maurya, A., Sastry, V.N.: Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and Internet of Things. Information 8(4), 136 (2017)
Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 9(1), 223–244 (2016)
Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 30(1), e2933 (2017)
Wu, F., Xu, L., Kumari, S., Li, X.: An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 11(1), 1–20 (2018)
Wu, F., Xu, L., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-Peer Network. Appl. 10(1), 16–30 (2017)
Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 14(9), 4081–4092 (2018)
Li, F., Xiong, P.: Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J. 13(10), 3677–3684 (2013)
Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Efficient group authentication protocol for secure 5G enabled vehicular communications. In: 2020 16th International Computer Engineering Conference (ICENCO), pp. 25–30. IEEE, Giza (2020)
Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2013)
He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321, 263–277 (2015)
Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Leng, L., Kumar, N.: Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 101, 42–62 (2016)
Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)
Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., Khan, M.K.: A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15), 2643–2655 (2016)
Peter, S.N., Vincent, O.N., Solomon, O.O.: Efficient authentication algorithm for secure remote access in wireless sensor networks. J. Comput. Sci. Res. 3(4), 43–50 (2021)
Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of things security. J. Ambient. Intell. Humaniz. Comput. 8(1), 101–116 (2017)
Adavoudi-Jolfaei, A., Ashouri-Talouki, M., Aghili, S.F.: Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-Peer Netw. Appl. 12(1), 43–59 (2019)
Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., Yang, Y.: An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76, 37–48 (2016)
Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016)
Chang, C.C., Le, H.D.: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wireless Commun. 15(1), 357–366 (2016)
Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks 20, 96–112 (2014)
Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks 36, 152–176 (2016)
Li, X., Peng, J., Obaidat, M.S., Wu, F., Khan, M.K., Chen, C.: A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 14(1), 39–50 (2019)
Xiong, L., Peng, D., Peng, T., Liang, H., Liu, Z.: A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors 17(11), 2681 (2017)
Lu, Y., Xu, G., Li, L., Yang, Y.: Anonymous three-factor authenticated key agreement for wireless sensor networks. Wireless Netw. 25(4), 1461–1475 (2019)
Das, A.K.: A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Pers. Commun. 82(3), 1377–1404 (2015)
Acknowledgements
This work is supported by Natural Science Foundation of Top Talent of SZTU (Grant number: 20211061010016).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Al Sibahee, M.A., Nyangaresi, V.O., Ma, J., Abduljabbar, Z.A. (2022). Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things. In: Hussain, W., Jan, M.A. (eds) IoT as a Service. IoTaaS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 421. Springer, Cham. https://doi.org/10.1007/978-3-030-95987-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-95987-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95986-9
Online ISBN: 978-3-030-95987-6
eBook Packages: Computer ScienceComputer Science (R0)