Return to search

Secure and lightweight authentication schemes for Internet of Things (IoT)

IoT platforms face huge challenges in deploying robust authentication mechanisms due to the fact that edge devices and resource-constrained devices may not have enough compute and storage capabilities to deploy and run existing mechanisms, which involve in general complex computations. Moreover, establishing end-to-end device authentication in the Internet of Things (IoT) networks is challenging because of the heterogeneous nature of IoT devices. One of the well-known challenges confronting the IoT infrastructure is related to authentication. Many IoT devices rely on weak authentication schemes, which has led in the last few years to several successful and widely publicized hacking incidents. According to the ISO/IEC 27002 standard, authentication is the process of determining whether something is, in fact, what it is declared to be. Authentication is considered the main gate to protect IoT networks from various security threats; determining who the entity is (authentication) is of high importance to establish a secure session between IoT devices. This dissertation identifies gaps in the literature and presents new authentication schemes and security mechanisms to improve IoT security and privacy against common attacks such as replay and impersonation. This research enhances IoT security and privacy by introducing a new lightweight mutual authentication and key exchange protocol for IoT based on dynamic identity and cumulative chained-hash. Nodes can anonymously and mutually authenticate and establish a session with the controller node using dynamic identities and temporary symmetric keys in an unlinkable and untraceable manner. Moreover, the enforcement of security policies between nodes is guaranteed by setting up virtual domain segregation and restricting node capabilities of sending and receiving data to or from other nodes. The Cumulative chained-hash technique is introduced as a way to ensure the identity of the sender (through challenge-response). Additionally, we introduce a new anonymous device- to-device mutual authentication and key exchange protocol based on the ZigBee technique. The proposed protocol relies on symmetric encryption and counter and enables IoT devices to authenticate in the network and agree on a shared secret session key when communicating with each other via a trusted intermediary (home controller). To achieve forward secrecy, the session keys are changed frequently after every communication session. The proposed scheme achieves secure, anonymous authentication with the unlinkability and untraceability of IoT device transactions.
The security of the protocols is evaluated and simulated using three different methods: informal analysis, formal analysis using the Burrows–Abadi–Needham logic (BAN), and model-checking using the automated validation of Internet security protocols and applica- tions (AVISPA) toolkit. The overhead and efficiency of the proposed schemes are analyzed and compared with other related schemes. The results showed that our protocols are in general more efficient. / Graduate

  1. http://hdl.handle.net/1828/11349
  2. Alshahrani, M. (2018). Emerging Biometrics Technologies. In International Confer- ence on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environ- ments. Springer, Cham, 2017.
  3. Alshahrani, M., Traore, I., Woungang, I. (2019). Anonymous IoT Mutual Inter- deviceAuthentication Scheme based on Incremental Counter. The 7th International Conference on Future Internet of Things and Cloud (FiCloud 2019), Istanbul, Turkey, August 26-28 2019.
  4. Alshahrani, M., Traore, I., & Saad, S. (2019). Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History. The 12th Interna- tional Symposium on Foundations Practice of Security (FPS2019), Toulouse, France, November 5-7 2019.
  5. Alshahrani, M., Traore, I., & Woungang, I. (2019). Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). The 6th IEEE International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2019), Granada, Spain, October 22-25 2019.
  6. Traore, I., Alshahrani, M., & Obaidat, M. S. (2018). State of the art and perspectives on traditional and emerging biometrics: A survey. Journal of Security and Privacy, Wiley, Vol. 1 Issue 6, November/December 2018.
  7. Alshahrani, M., & Traore, I. (2019). Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain. Journal of Information Security and Applications, Elsevier, Volume 45, April 2019, Pages 156-175.
  8. Alshahrani, M., Traore, I., & Woungang, I. (2019). Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Journal of Internet of Things, Elsevier, Volume 7, September 2019.
Identiferoai:union.ndltd.org:uvic.ca/oai:dspace.library.uvic.ca:1828/11349
Date04 December 2019
CreatorsAlshahrani, Mohammed M.
ContributorsTraore, Issa
Source SetsUniversity of Victoria
LanguageEnglish, English
Detected LanguageEnglish
TypeThesis
Formatapplication/pdf
RightsAvailable to the World Wide Web

Page generated in 0.0029 seconds