Abstract
Internet of Things (IoT) has evolved on a large scale and is widely being used across all the industries in various sectors. The IoT devices have a limited capacity in terms of memory and computational ability. Compared to other network applications, providing security for IoT device communication is a relatively more difficult task. The risk of getting prone to attacks can be minimized by implementing a robust authentication mechanism. To achieve it, we are proposing a lightweight authentication protocol. The security analysis was conducted using the Scyther tool, which proves that the mechanism proposed is secure against replay, session key disclosure and impersonation attacks. Moreover, the performance of the proposed protocol has been analysed and evaluated with other protocols in terms of communication cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Statista: Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025, https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/ Accessed on April 7, 2021
H. Chunduri, T. Gireesh Kumar, P.V.S. Charan, A Multi Class Classification for Detection of IoT Botnet Malware, in Computing Science, Communication and Security. COMS2 2021. Communications in Computer and Information Science, ed by N. Chaubey, S. Parikh, K. Amin, vol 1416 (Springer, Cham, 2021)
M. Shriny, A. Ajisha, C. Srinivasan, Design and implementation of the protocol for secure software-based remote attestation in IoT devices, in International Conference on Soft Computing and Signal Processing (Springer, Singapore, 2019)
S.K.B. Hemanth, K.V. Lakshmy, Enhanced attach procedure for prevention of authentication synchronisation failure attack, in Soft Computing and Signal Processing. ICSCSP 2019. Advances in Intelligent Systems and Computing, ed by V. Reddy, V. Prasad, J. Wang, K. Reddy, vol 1118 (Springer, Singapore, 2020)
M. El-Hajj et al., A survey of internet of things (IoT) authentication schemes. Sensors 19(5), 1141 (2019)
E.D.O. Silva, et al. Authentication and the internet of things: a survey based on a systematic mapping, in International Conference on Software Engineering Advances (2017)
H. Khemissa, D. Tandjaoui, A lightweight authentication scheme for E-health applications in the context of internet of things, in 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies (IEEE, 2015)
H. Khemissa, D. Tandjaoui, A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of internet of things, in 2016 Wireless Telecommunications Symposium (WTS) (IEEE, 2016) https://ieeexplore.ieee.org/abstract/document/9242592
M. Shahzad, M.P. Singh, Continuous authentication and authorization for the internet of things. IEEE Internet Comput. 21(2), 86–90 (2017)
A.P. Haripriya, K. Kulothungan, ECC based self-certified key management scheme for mutual authentication in Internet of Things, in 2016 International Conference on Emerging Technological Trends (ICETT) (IEEE, 2016)
S. Kumari et al., A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 74(12), 6428–6453 (2018)
A. Shahidinejad et al., Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment (IEEE Consumer Electron, Magaz, 2021)
S.K. Sood, Dynamic identity based authentication protocol for two-server architecture. J. Inf. Secur. 3(04), 326 (2012)
T. Kothmayr, et al., A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication, 37th Annual IEEE Conference on Local Computer Networks-Workshops (IEEE, 2012)
M. Qi, J. Chen, Y. Chen, A secure authentication with key agreement scheme using ECC for satellite communication systems. Int. J. Satell. Commun. Netw. 37(3), 234–244 (2019)
K. Xue, P. Hong, C. Ma, A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195–206 (2014)
C.J.F. Cremers, The scyther tool: verification, falsification, and analysis of security protocols, in International conference on computer aided verification (Springer, Berlin, Heidelberg, 2008)
C. Cremers, The scyther tool, www.cs.ox.ac.uk/people/cas.cremers/scyther/ [Online; Accessed on March 10, 2021]
G. Lowe, A hierarchy of authentication specifications, in Proceedings 10th Computer Security Foundations Workshop (IEEE, 1997)
D. Yang, B. Yang, A biometric password-based multi-server authentication scheme with smartcard, in International Conference On Computer Design and Appliations, vol. 5 (ICCDA, 2010), pp. 554–559
D. He, S. Wu, Security flaws in a smartcard based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1), 323–329 (2013)
X. Li, Y.P. Xiong, J. Ma, W.D. Wang, An efficient and security dynamic identity based authentication protocol for multi-server architecture using smartcards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)
D. Dolev, A. Yao, On the security of public key protocols. IEEE Trans. Inf. Theo. 29(2), 198–208 (1983)
A. Bashar, Sensor cloud based architecture with efficient data computation and security implantation for Internet of Things application. J. ISMAC 2(02), 96–105 (2020)
M. Dammak, et al. Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans. Netw. Serv. Manage. 17(3 (2020): 1742-1757
M. Nafi, S. Bouzefrane, M. Omar, Matrix-based key management scheme for IoT networks. Ad Hoc Netw. 97, 102003 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Abhishek, C., Srinivasan, C., K.V., L., Anand, P.M. (2022). SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device. In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_61
Download citation
DOI: https://doi.org/10.1007/978-981-16-5529-6_61
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5528-9
Online ISBN: 978-981-16-5529-6
eBook Packages: EngineeringEngineering (R0)