A Robust Privacy Preserving Authentication Scheme for IOT Environment by 5G Technology
A Robust Privacy Preserving Authentication Scheme for IOT Environment by 5G Technology
Keywords:
: IOT ; authentication ; security ; privacy ; ECC algorithmAbstract
In recent years, secure communication between the interconnected components of the internet of things has become an important and worrying issue due to some attacks on the IoT. The Internet of Things (IOT) is the integration of things with the world of the Internet, where this integration takes place by adding devices or programs to be smart and, as a result, they will be able to communicate with one another and participate in all elements of life quite efficiently. Accordingly, we've developed an authentication protocol for the IoT ecosystem; it's primary function is to ensure the safety of data exchange between the many devices that make up the IoT. Our proposed protocol is based on the elliptic curve cipher (ECC) algorithm, which greatly aids in protecting IoT components from physical assault. Our informal protocol analysis demonstrates that our solution not only protects users' privacy by concealing their devices' identities but also thwarts impersonation, counterattacks, and tracking and suggestion attacks directed at IoT devices. Security characteristics of the proposed protocol are also explicitly examined with the help of the ( SCYTHER) program. In addition, the effectiveness of the suggested protocol is evaluated by determining both its excess costs and its communication costs. Therefore, it appears that the protocol is vastly superior than the many other equivalent protocols by assessing its performance and security.
Downloads
References
Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed, A. I. A., Gani, A., Imran, M., & Guizani, M,"Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges", IEEE wireless communications, vol.24, no.3, pp .10-16, 2017.
Sheng, Z., Mahapatra, C., Zhu, C., & Leung, V. C, "Recent advances in industrial wireless sensor networks toward efficient management in IoT", IEEE access, vol . 3, pp . 622-637, 2015
Vermesan, O, & Friess, P,"Internet of things: converging technologies for smart environments and integrated ecosystems". River publishers, Eds, 2013,pp.145-150.
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B." Secure integration of IoT and cloud computing. Future Generation Computer Systems",vol 78,no.4, pp.964-975,2018.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. " Security, privacy and trust in Internet of Things: The road ahead. Computer networks" vol. 76, no.5,pp.146-164,2015.
M. El-Hajj, A. Fadlallah, M. Chamoun, and A. Serhrouchni, ``A survey of Internet of Things (IoT) authentication schemes,'' Sensors, vol. 19, no. 5, pp. 1141, 2019.
A. K. Das, S. Zeadally, and D. He, ``Taxonomy and analysis of security protocols for Internet of Things,'' Future Gener. Comput. Syst., vol. 89, pp. 110_125, 2018.
M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L. Shu, ``Authentication protocols for Internet of Things: A comprehensive survey,'' Secur. Commun. Netw., vol. 2017, pp. 1_41, 2017.
K. Han, T. Shon, and K. Kim, ``Ef_cient mobile sensor authentication in smart home and WPAN,'' IEEE Trans. Consum. Electron., vol. 56, no. 2, pp. 591_596, 2010.
S. Kumari, A. K. Das, M. Wazid, X. Li, F. Wu, K. K. R. Choo, and M. K. Khan, ``On the design of a secure user authentication and key agreement scheme for wireless sensor networks,'' Concurrency Comput. Pract. Exper., vol. 29, no. 23, pp. 1_24, 2017.
M. Bilal and S. G. Kang, ``An authentication protocol for future sensor networks,'' Sensors, vol. 17, no. 5, p. 979, 2017.
J. Jeong, M. Y. Chung, and H. Choo, ``Integrated OTP-based user authentication scheme using smart cards in home networks,'' in Proc. 41st Annu. Hawaii Int. Conf. Syst. Sci. (HICSS), Waikoloa, HI, USA, Jan. 2008, pp. 294_301.
B. Vaidya, D. Makrakis, and H. T. Mouftah, ``Device authentication mechanism for smart energy home area networks,'' in Proc. IEEE Int. Conf. Consum. Electron. (ICCE), Jan. 2011, pp. 787_788.
F. K. Santoso and N. C. H. Vun, ``Securing IoT for smart home system,'' in Proc. Int. Symp. Consum. Electron., 2015, pp. 1_2.
M. Shuai, N. Yu, H. Wang, and L. Xiong, ``Anonymous authentication scheme for smart home environment with provable security,'' Comput. Secur., vol. 86, pp. 132_146, Sep. 2019.
M. Wazid, A. K. Das, V. Odelu, N. Kumar, and W. Susilo, ``Secure remote user authenticated key establishment protocol for smart home environment,'' IEEE Trans. Dependable Secure Comput., vol. 17, no. 2, pp. 391_406, Dec. 2020.
Q. Lyu, N. Zheng, H. Liu, C. Gao, S. Chen, and J. Liu, ``Remotely access `my' smart home in private: An anti-tracking authentication and key agreement scheme,'' IEEE Access, vol. 7, pp. 41835_41851, 2019.
X. Sun, S. Men, C. Zhao, and Z. Zhou, ``A security authentication scheme in machine-to-machine home network service,'' Secur. Commun. Netw., vol. 8, no. 16, pp. 2678_2686, Nov. 2015.
M. Jan, P. Nanda, M. Usman, and X. He, ``PAWN: A payload-based mutual authentication scheme for wireless sensor networks,'' Concurrency Compute, Pract. Exper., vol. 29, no. 17, p. e3986, Sep. 2017.
T. Song, R. Li, B. Mei, J. Yu, X. Xing, and X. Cheng, ``A privacy preserv ing communication protocol for IoT applications in smart homes,'' IEEE Internet Things J., vol. 4, no. 6, pp. 1844_1852, Dec. 2017.
A. A. Alamr, F. Kausar, J. Kim, and C. Seo, ``A secure ECC- based RFID mutual authentication protocol for Internet of Things,'' J. Supercomput., vol. 74, no. 9, pp. 4281_4294, Sep. 2018.
S. Hussain, S. A. Chaudhry, O. A. Alomari, M. H. Alsharif, M. K. Khan, and N. Kumar, ``Amassing the security: An ECC-based authentication scheme for Internet of drones,'' IEEE Syst. J., early access, Mar. 1, 2021.
S. Kalra and S. K. Sood, ``Secure authentication scheme for IoT and cloud servers,'' Pervas. Mobile Comput., vol. 24, pp. 210_223, Dec. 2015.
C.-M. Chen, K.-H. Wang, W. Fang, T.-Y. Wu, and E. K. Wang, ``Recon sidering a lightweight anonymous authentication protocol,'' J. Chin. Inst. Engineers, vol. 42, no. 1, pp. 9_14, Jan. 2019
A. Maarof, M. Senhadji, Z. Labbi, and M. Belkasmi, ``Authentication protocol for securing Internet of Things,'' in Proc. 4th Int. Conf. Eng. MIS (ICEMIS), 2018, pp. 1_7.
C.-C. Chang, H.-L. Wu, and C.-Y. Sun, ``Notes on `secure authentication scheme for IoT and cloud servers,''' Pervas. Mobile Comput., vol. 38, pp. 275_278, Jul. 2017
S. A. Chaudhry, ``Correcting `PALK: Password-based anonymous lightweight key agreement framework for smart grid,''' Int. J. Electr Power Energy Syst., vol. 125, Feb. 2021, Art. no. 106529.
S. Kumari, M. Karuppiah, A. K. Das, X. Li, F. Wu, and N. Kumar, ``A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers,'' J. Supercomput., vol. 74, no. 12, pp. 6428_6453, Dec. 2018.
C. Lyu, D. Gu,Y. Zeng, and P. Mohapatra, ``PBA: Prediction-based authen tication for vehicle-to-vehicle communications,'' IEEE Trans. Dependable Secure Comput., vol. 13, no. 1, pp. 71_83, Jan. 2016.
Yehia, M., AlTawy, R., & Gulliver, T. A. "Security analysis of DGM and GM group signature schemes instantiated with XMSS-T. In Information Security and Cryptology" 17th International Conference, 2021,pp. 61-81.
G. Saldamli, L. Ertaul, and B. Kodirangaiah, "Post-quantum cryptography on IoT: Merkle's tree authentication,'' in Proc. Int. Conf. Wireless Netw. (ICWN) , vol.3,no.4,pp. 35_41,2018
M. N. Aman, K. C. Chua, and B. Sikdar, ``Mutual authentication in IoT systems using physical unclonable functions,'' IEEE Internet Things J., vol. 4, no. 5, pp. 1327_1340, Oct. 2017.
P. Gope and B. Sikdar, ``Lightweight and privacy-preserving two-factor authentication scheme for IoT devices,'' IEEE Internet Things J., vol. 6, no. 1, pp. 580_589, Feb. 2019.
N. Chikouche, P.-L. Cayrel, E. H. M. Mboup, and B. O. Boidje``A privacy-preserving code-based authentication protocol for Internet of Things,'' J. Supercomput., vol. 75, no. 12, pp. 8231_8261, Dec. 2019.
A. Bander. and K. Mahmood. "Provable Privacy Preserving Authentication Solution for Internet of Things Environment ." IEEE Access,vol 9 (2021): 82857-82865.
Srinadh, V., Maram, B., & Daniya, T. (2021, December). Data Security And Recovery Approach Using Elliptic Curve Cryptography. In 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS) (pp. 1-6). IEEE.
Shemanske, T. R. Modern Cryptography and Elliptic Curves. American Mathematical Soc,2017,pp83.
Ullah, S., Zheng, J., Din, N., Hussain, M. T., Ullah, F., & Yousaf, M. "Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends". Computer Science Review, vol.47,pp.3-12,2023.
V. S. Miller, ``Use of elliptic curves in cryptography,'' in Proc. Conf Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, Dec. 1985, pp. 417_426.
Harsha, A., & Patil, B. "A Review: Security of Data in Cloud Storage using ECC Algorithm". Bonfring International Journal of Software Engineering and Soft Computing.vol.6,no.2,pp2-10,2016.
Gebregiyorgis, S. W. "Algorithms for the elliptic curve discrete logarithm and the approximate common divisor problem ",Doctoral dissertation, PhD Thesis, University of Auckland, New Zealand,2016.
Bojjagani, S., Reddy, Y. P., Anuradha, T., Rao, P. V., Reddy, B. R., & Khan, M. K. (2022). Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems. IEEE Transactions on Intelligent Transportation Systems, 23(12), 24698-24713.
KOZAKIEWICZ, M, & SIEDLECKA-LAMCH, O. "Some Remarks on Security Protocols Verification Tools. In Information Systems Architecture and Technology": Proceedings of 37th International Conference on Information Systems Architecture and Technology.vol.2, no.2, pp. 65-75, 2017
YANG, H., OLESHCHUK, V., & PRINZ, A. "Verifying Group Authentication Protocols by Scyther. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications" (JoWUA), vol.7,no.2, pp.3-19,2016.
PATEL, R., BORISANIYA, B., PATEL, A., PATEL, D., RAJARAJAN, M., & ZISMAN, A. "Comparative analysis of formal model checking tools for security protocol verification. In International Conference on Network Security and Applications ", Springer Berlin Heidelberg vol.3, no.2, pp. 152- 163, (2010).
Kilinc HH, Yanik T ."A survey of SIP authentication and key agreement schemes". IEEE Commun Surv Tutor ,vol.16,no1.2,pp.1005–1023,2014
