Skip to main content

SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 311))

Abstract

Internet of Things (IoT) has evolved on a large scale and is widely being used across all the industries in various sectors. The IoT devices have a limited capacity in terms of memory and computational ability. Compared to other network applications, providing security for IoT device communication is a relatively more difficult task. The risk of getting prone to attacks can be minimized by implementing a robust authentication mechanism. To achieve it, we are proposing a lightweight authentication protocol. The security analysis was conducted using the Scyther tool, which proves that the mechanism proposed is secure against replay, session key disclosure and impersonation attacks. Moreover, the performance of the proposed protocol has been analysed and evaluated with other protocols in terms of communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Statista: Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025, https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/ Accessed on April 7, 2021

  2. H. Chunduri, T. Gireesh Kumar, P.V.S. Charan, A Multi Class Classification for Detection of IoT Botnet Malware, in Computing Science, Communication and Security. COMS2 2021. Communications in Computer and Information Science, ed by N. Chaubey, S. Parikh, K. Amin, vol 1416 (Springer, Cham, 2021)

    Google Scholar 

  3. M. Shriny, A. Ajisha, C. Srinivasan, Design and implementation of the protocol for secure software-based remote attestation in IoT devices, in International Conference on Soft Computing and Signal Processing (Springer, Singapore, 2019)

    Google Scholar 

  4. S.K.B. Hemanth, K.V. Lakshmy, Enhanced attach procedure for prevention of authentication synchronisation failure attack, in Soft Computing and Signal Processing. ICSCSP 2019. Advances in Intelligent Systems and Computing, ed by V. Reddy, V. Prasad, J. Wang, K. Reddy, vol 1118 (Springer, Singapore, 2020)

    Google Scholar 

  5. M. El-Hajj et al., A survey of internet of things (IoT) authentication schemes. Sensors 19(5), 1141 (2019)

    Article  MathSciNet  Google Scholar 

  6. E.D.O. Silva, et al. Authentication and the internet of things: a survey based on a systematic mapping, in International Conference on Software Engineering Advances (2017)

    Google Scholar 

  7. H. Khemissa, D. Tandjaoui, A lightweight authentication scheme for E-health applications in the context of internet of things, in 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (IEEE, 2015)

    Google Scholar 

  8. H. Khemissa, D. Tandjaoui, A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of internet of things, in 2016 Wireless Telecommunications Symposium (WTS) (IEEE, 2016) https://ieeexplore.ieee.org/abstract/document/9242592

  9. M. Shahzad, M.P. Singh, Continuous authentication and authorization for the internet of things. IEEE Internet Comput. 21(2), 86–90 (2017)

    Article  Google Scholar 

  10. A.P. Haripriya, K. Kulothungan, ECC based self-certified key management scheme for mutual authentication in Internet of Things, in 2016 International Conference on Emerging Technological Trends (ICETT) (IEEE, 2016)

    Google Scholar 

  11. S. Kumari et al., A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 74(12), 6428–6453 (2018)

    Article  Google Scholar 

  12. A. Shahidinejad et al., Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment (IEEE Consumer Electron, Magaz, 2021)

    Google Scholar 

  13. S.K. Sood, Dynamic identity based authentication protocol for two-server architecture. J. Inf. Secur. 3(04), 326 (2012)

    Google Scholar 

  14. T. Kothmayr, et al., A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, 37th Annual IEEE Conference on Local Computer Networks-Workshops (IEEE, 2012)

    Google Scholar 

  15. M. Qi, J. Chen, Y. Chen, A secure authentication with key agreement scheme using ECC for satellite communication systems. Int. J. Satell. Commun. Netw. 37(3), 234–244 (2019)

    Article  Google Scholar 

  16. K. Xue, P. Hong, C. Ma, A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195–206 (2014)

    Article  MathSciNet  Google Scholar 

  17. C.J.F. Cremers, The scyther tool: verification, falsification, and analysis of security protocols, in International conference on computer aided verification (Springer, Berlin, Heidelberg, 2008)

    Google Scholar 

  18. C. Cremers, The scyther tool, www.cs.ox.ac.uk/people/cas.cremers/scyther/ [Online; Accessed on March 10, 2021]

  19. G. Lowe, A hierarchy of authentication specifications, in Proceedings 10th Computer Security Foundations Workshop (IEEE, 1997)

    Google Scholar 

  20. D. Yang, B. Yang, A biometric password-based multi-server authentication scheme with smartcard, in International Conference On Computer Design and Appliations, vol. 5 (ICCDA, 2010), pp. 554–559

    Google Scholar 

  21. D. He, S. Wu, Security flaws in a smartcard based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1), 323–329 (2013)

    Article  Google Scholar 

  22. X. Li, Y.P. Xiong, J. Ma, W.D. Wang, An efficient and security dynamic identity based authentication protocol for multi-server architecture using smartcards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)

    Article  Google Scholar 

  23. D. Dolev, A. Yao, On the security of public key protocols. IEEE Trans. Inf. Theo. 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  24. A. Bashar, Sensor cloud based architecture with efficient data computation and security implantation for Internet of Things application. J. ISMAC 2(02), 96–105 (2020)

    Article  Google Scholar 

  25. M. Dammak, et al. Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans. Netw. Serv. Manage. 17(3 (2020): 1742-1757

    Google Scholar 

  26. M. Nafi, S. Bouzefrane, M. Omar, Matrix-based key management scheme for IoT networks. Ad Hoc Netw. 97, 102003 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to CH.N.S. Abhishek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abhishek, C., Srinivasan, C., K.V., L., Anand, P.M. (2022). SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_61

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-5529-6_61

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-5528-9

  • Online ISBN: 978-981-16-5529-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics