scholarly journals Resource Efficient Authentication and Session Key Establishment Procedure for Low-Resource IoT Devices

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 170615-170628 ◽  
Author(s):  
Sarmadullah Khan ◽  
Ahmed Ibrahim Alzahrani ◽  
Osama Alfarraj ◽  
Nasser Alalwan ◽  
Ali H. Al-Bayatti
Author(s):  
M G Padmashree ◽  
◽  
J S Arunalatha ◽  
K R Venugopal ◽  
◽  
...  

Security is a prerequisite of each device that provides physical access to anyone and is logically expose to communication network attacks. The Internet of Things (IoT) must assure energy-saving provision due to the unique characteristics of IoT devices that comprise cost-effective, low power, and data delivery capacity. A Key-based Authentication scheme is a need without creating a bottleneck of communication for security in IoT integration. Security solutions viz., Authentication, Access control, and Key management are essential for the protection of communication in IoT applications. Public Key Cryptography (PKC) encapsulates multiple security functionalities and applications in conventional networks. The proposed Elliptic Curve Cryptography (ECC) Blended Authentication and Session Key Establishment Technique (EBASKET), an enhanced HPAKE scheme secures the IoT device interactions using Hash and Public Key Cryptography conjoined with a Stochastic Number. EBASKET authenticates and establishes Session Key for communicating IoT Devices using ECC that enhances the security resisting Key Disclosure, Man-in-The-Middle (MiTM), Relay threats. It incorporates an Elliptic Curve of 256 bits to achieve the 128 bits security level. EBASKET accomplishes Key Establishment utilizes Nonce as the Fragmentary Key after authenticating the intercommunicating Devices. It decreases the overall delay incurred reducing the communication overhead minimizing the quantity and magnitude of the messages exchange for Authentication. A secure Key Establishment for the Session uses a Stochastic, Hashing function, and ECC. The interactions throughout the Predeploying, Authenticating, and Key Establishing process cause a delay. The performance graph depicts that Key Establishment and authenticating the IoT devices using ECC and reducing communicational cost enhance security than Enhanced, Hybrid, and Lightweight Authentication Schemes.


Author(s):  
Emil Bejder ◽  
Adam Krog Mathiasen ◽  
Michele De Donno ◽  
Nicola Dragoni ◽  
Xenofon Fafoutis

2016 ◽  
Vol 16 (1) ◽  
pp. 254-264 ◽  
Author(s):  
Pardeep Kumar ◽  
Andrei Gurtov ◽  
Jari Iinatti ◽  
Mika Ylianttila ◽  
Mangal Sain

2016 ◽  
Author(s):  
Jiye Kim ◽  
Jongho Moon ◽  
Jaewook Jung ◽  
Donghoon Lee ◽  
Youngsook Lee ◽  
...  

Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4361 ◽  
Author(s):  
Ahmed Mostafa ◽  
Suk Jin Lee ◽  
Yesem Kurt Peker

Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments.


2016 ◽  
Vol 31 (6) ◽  
pp. 35-43 ◽  
Author(s):  
Cheng-Chi Lee ◽  
Yan-Ming Lai ◽  
Pu-Jen Cheng

Sign in / Sign up

Export Citation Format

Share Document