Skip to main content

Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

  • Conference paper
  • First Online:
IoT as a Service (IoTaaS 2021)

Abstract

To ensure secure access to the data held in internet of things, many lightweight authentication schemes have been developed using approaches such as symmetric cryptography or hashing operations. Although these schemes achieve forward key secrecy and user anonymity, de-synchronization is a major problem in these protocols. As such, many other schemes have been presented to address this pertinent security challenge. However, some of these schemes are still susceptible to smart card loss attacks among others. In this paper, stochastic security ephemeral generation protocol for 5G enabled internet of things is presented. It is demonstrated to offer mutual authentication and session key agreement. It is also robust against packet replays, eavesdropping and man-in-the-middle attacks. In terms of performance, it has the lowest computation and communication overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12, 1874–1884 (2017)

    Article  Google Scholar 

  2. Shin, S., Kwon, T.: A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access 8, 67555–67571 (2020)

    Article  Google Scholar 

  3. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103, 194–204 (2018)

    Article  Google Scholar 

  4. Nyangaresi, V.O., Affane Moundounga, A.R.: Secure data exchange scheme for smart grids. In: 2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI), pp. 312–316. IEEE, Naples (2021)

    Google Scholar 

  5. Kumar, D., Singh, H.K., Ahlawat, C.: A secure three-factor authentication scheme for wireless sensor networks using ECC. J. Discrete Math. Sci. Cryptogr. 23(4), 879–900 (2020)

    Article  MathSciNet  Google Scholar 

  6. Pundir, S., Wazid, M., Singh, D.P., Das, A.K., Rodrigues, J.J., Park, Y.: Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: survey and future challenges. IEEE Access 8, 3343–3363 (2019)

    Article  Google Scholar 

  7. Amin, R., Islam, S.H., Kumar, N., Choo, K.K.R.: An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J. Netw. Comput. Appl. 104, 133–144 (2018)

    Article  Google Scholar 

  8. Nyangaresi, V.O., Ogundoyin, S.O.: Certificate based authentication scheme for smart homes. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 202–207. IEEE, Antalya (2021)

    Google Scholar 

  9. Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 15(9), 4957–4968 (2019)

    Article  Google Scholar 

  10. Nyangaresi, V.O.: Lightweight key agreement and authentication protocol for smart homes. In: 2021 IEEE AFRICON, pp. 1–6. IEEE, Arusha (2021)

    Google Scholar 

  11. Zhu, H., Tan, Y.A., Zhu, L., Wang, X., Zhang, Q., Li, Y.: An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors 18(5), 1–15 (2018)

    Article  Google Scholar 

  12. Nyangaresi, V.O., Alsamhi, S.H.: Towards secure traffic signaling in smart grids. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 196–201. IEEE, Antalya (2021)

    Google Scholar 

  13. Karakaya, A., Akleylek, S.: A survey on security threats and authentication approaches in wireless sensor networks. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4. IEEE, Antalya (2018)

    Google Scholar 

  14. Nyangaresi, V.: Hardware assisted protocol for attacks prevention in ad hoc networks. In: Miraz, M.H., Southall, G., Ali, M., Ware, A., Soomro, S. (eds.) iCETiC 2021. LNICSSITE, vol. 395, pp. 3–20. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90016-8_1

    Chapter  Google Scholar 

  15. Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for Internet of Things: a comprehensive survey. Secur. Commun. Network 2017, 1–41 (2017)

    Article  Google Scholar 

  16. Nyangaresi, V., Rodrigues, A., Taha, N.: Mutual authentication protocol for secure VANET data exchanges. In: Perakovic, D., Knapcikova, L. (eds.) FABULOUS 2021. LNICSSITE, vol. 382, pp. 58–76. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78459-1_5

    Chapter  Google Scholar 

  17. Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Futur. Gener. Comput. Syst. 78, 956–963 (2018)

    Article  Google Scholar 

  18. Sureshkumar, C., Sabena, S.: Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks. Wireless Pers. Commun. 112(3), 1517–1536 (2020)

    Article  Google Scholar 

  19. Nyangaresi, V.O., Petrovic, N.: Efficient PUF based authentication protocol for internet of drones. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021)

    Google Scholar 

  20. Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)

    Article  MathSciNet  Google Scholar 

  21. Nyangaresi, V.O., Mohammad, Z.: Privacy preservation protocol for smart grid networks. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021)

    Google Scholar 

  22. Xiong, L., Xiong, N., Wang, C., Yu, X., Shuai, M.: An efficient lightweight authentication scheme with adaptive resilience of asynchronization attacks for wireless sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 51(9), 5626–5638 (2019)

    Article  Google Scholar 

  23. Park, Y., Park, Y.: Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12), 2123 (2016)

    Article  Google Scholar 

  24. Wang, C., Xu, G., Sun, J.: An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12), 2946 (2017)

    Article  Google Scholar 

  25. Maurya, A., Sastry, V.N.: Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and Internet of Things. Information 8(4), 136 (2017)

    Article  Google Scholar 

  26. Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 9(1), 223–244 (2016)

    Article  Google Scholar 

  27. Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 30(1), e2933 (2017)

    Article  Google Scholar 

  28. Wu, F., Xu, L., Kumari, S., Li, X.: An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 11(1), 1–20 (2018)

    Article  Google Scholar 

  29. Wu, F., Xu, L., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-Peer Network. Appl. 10(1), 16–30 (2017)

    Article  Google Scholar 

  30. Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 14(9), 4081–4092 (2018)

    Article  Google Scholar 

  31. Li, F., Xiong, P.: Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J. 13(10), 3677–3684 (2013)

    Article  Google Scholar 

  32. Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Efficient group authentication protocol for secure 5G enabled vehicular communications. In: 2020 16th International Computer Engineering Conference (ICENCO), pp. 25–30. IEEE, Giza (2020)

    Google Scholar 

  33. Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2013)

    Article  Google Scholar 

  34. He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321, 263–277 (2015)

    Google Scholar 

  35. Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Leng, L., Kumar, N.: Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 101, 42–62 (2016)

    Article  Google Scholar 

  36. Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)

    Google Scholar 

  37. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., Khan, M.K.: A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15), 2643–2655 (2016)

    Article  Google Scholar 

  38. Peter, S.N., Vincent, O.N., Solomon, O.O.: Efficient authentication algorithm for secure remote access in wireless sensor networks. J. Comput. Sci. Res. 3(4), 43–50 (2021)

    Google Scholar 

  39. Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of things security. J. Ambient. Intell. Humaniz. Comput. 8(1), 101–116 (2017)

    Article  Google Scholar 

  40. Adavoudi-Jolfaei, A., Ashouri-Talouki, M., Aghili, S.F.: Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-Peer Netw. Appl. 12(1), 43–59 (2019)

    Article  Google Scholar 

  41. Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., Yang, Y.: An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76, 37–48 (2016)

    Article  Google Scholar 

  42. Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016)

    Google Scholar 

  43. Chang, C.C., Le, H.D.: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wireless Commun. 15(1), 357–366 (2016)

    Article  MathSciNet  Google Scholar 

  44. Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks 20, 96–112 (2014)

    Google Scholar 

  45. Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks 36, 152–176 (2016)

    Google Scholar 

  46. Li, X., Peng, J., Obaidat, M.S., Wu, F., Khan, M.K., Chen, C.: A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 14(1), 39–50 (2019)

    Article  Google Scholar 

  47. Xiong, L., Peng, D., Peng, T., Liang, H., Liu, Z.: A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors 17(11), 2681 (2017)

    Article  Google Scholar 

  48. Lu, Y., Xu, G., Li, L., Yang, Y.: Anonymous three-factor authenticated key agreement for wireless sensor networks. Wireless Netw. 25(4), 1461–1475 (2019)

    Article  Google Scholar 

  49. Das, A.K.: A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Pers. Commun. 82(3), 1377–1404 (2015)

    Google Scholar 

Download references

Acknowledgements

This work is supported by Natural Science Foundation of Top Talent of SZTU (Grant number: 20211061010016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junchao Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al Sibahee, M.A., Nyangaresi, V.O., Ma, J., Abduljabbar, Z.A. (2022). Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things. In: Hussain, W., Jan, M.A. (eds) IoT as a Service. IoTaaS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 421. Springer, Cham. https://doi.org/10.1007/978-3-030-95987-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-95987-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-95986-9

  • Online ISBN: 978-3-030-95987-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics