On the Resilience of Authentication Schemes in IoT Networks With Different Structural Topologies

被引:1
|
作者
Lau, Chi Ho [1 ]
Yan, Fan [2 ]
Chan, Sammy [1 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[2] Hong Kong Metropolitan Univ, Sch Sci & Technol, Hong Kong, Peoples R China
关键词
Authentication; Internet of Things; Network topology; Security; Topology; Resilience; Blockchains; IoT security; blockchain; authentication; complex network; SECURITY; INTERNET;
D O I
10.1109/TCE.2023.3332133
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The concern of network security is one of the major factors preventing the development of IoT-based applications. Such security risks can be mitigated by adopting a proper authentication scheme. The lack of quantitative comparison increases the difficulty when choosing the authentication scheme. This paper presents an empirical study of the effectiveness of three authentication methods including the blockchain-based method, a newly joined competitor. This study does not solely focus on the scheme level security but also five common structural topologies in IoT networks. We conduct simulations of these topological networks under six attack strategies and evaluate their survival sizes and survival link ratios. The network vulnerability coefficient is also proposed to illustrate a network's expected exploit rate providing quantitative results to compare among schemes. The blockchain-based method achieves a 57.68% to 225.28% improvement compared to a defenseless network and outperforms other traditional schemes in BA, NSW and GRID structured networks. The results indicate that the network topology can greatly affect the resilience of an authentication scheme.
引用
收藏
页码:389 / 400
页数:12
相关论文
共 50 条
  • [1] Effectiveness of Authentication Schemes in the Internet of Things Networks with Different Structural Topologies
    Lau, Chi Ho
    Yan, Fan
    Chan, Sammy
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1118 - 1123
  • [2] Comparison on resilience and energy efficiency of authentication schemes in IoT networks
    Lau, Chi Ho
    Chan, Sammy
    EXPERT SYSTEMS, 2025, 42 (01)
  • [3] Authentication schemes for Internet of Things (IoT) networks: A systematic review and security assessment
    Yalli, Jameel Shehu
    Hasan, Mohd Hilmi
    Jung, Low Tan
    Al-Selwi, Safwan Mahmood
    INTERNET OF THINGS, 2025, 30
  • [4] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    SENSORS, 2019, 19 (05)
  • [5] Understanding the security failures of four user authentication schemes for wireless sensor networks in IoT environment
    Tyagi, Gaurav
    Kumar, Rahul
    International Journal of Computers and Applications, 2024, 46 (09) : 769 - 784
  • [6] Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
    Rasheed, Amar
    Hashemi, Ray R.
    Bagabas, Ayman
    Young, Jeffrey
    Badri, Chanukya
    Patel, Keyur
    2019 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID), 2019,
  • [7] Novel Authentication Schemes for IoT Based Healthcare Systems
    Hou, Jia-Li
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [8] A Lightweight Authentication and Key Agreement Schemes for IoT Environments
    Lee, Dae-Hwi
    Lee, Im-Yeong
    SENSORS, 2020, 20 (18) : 1 - 18
  • [9] Security and IoT Cloud Federation: Design of Authentication Schemes
    Barreto, Luciano
    Celesti, Antonio
    Villari, Massimo
    Fazio, Maria
    Puliafito, Antonio
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT I, 2016, 169 : 337 - 346
  • [10] FlexPass: Symbiosis of Seamless User Authentication Schemes in IoT
    Belk, Marios
    Fidas, Christos
    Pitsillides, Andreas
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,