A fast and scalable authentication scheme in IOT for smart living

被引:16
|
作者
Li, Jianhua [1 ]
Jin, Jiong [2 ]
Lyu, Lingjuan [3 ]
Yuan, Dong [4 ]
Yang, Yingying [5 ]
Gao, Longxiang [1 ]
Shen, Chao [6 ]
机构
[1] Deakin Univ, Sch Info Technol, Melbourne, Vic 3125, Australia
[2] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[3] Natl Univ Singapore, Singapore, Singapore
[4] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
[5] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW 2007, Australia
[6] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Shx, Peoples R China
关键词
Internet of things (IoT); Fog computing; Device-to-device authentication; Microservice; Certificate authority (CA); Virtualization; INTERNET; SECURITY; FOG; THINGS; CHALLENGES; PLACEMENT; PRIVACY;
D O I
10.1016/j.future.2020.11.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Numerous resource-limited smart objects (SOs) such as sensors and actuators have been widely deployed in smart environments, opening new attack surfaces to intruders. The severe security flaw discourages the adoption of the Internet of things in smart living. In this paper, we leverage fog computing and microservice to push certificate authority (CA) functions to the proximity of data sources. Through which, we can minimize attack surfaces and authentication latency, and result in a fast and scalable scheme in authenticating a large volume of resource-limited devices. Then, we design lightweight protocols to implement the scheme, where both a high level of security and low computation workloads on SO (no bilinear pairing requirement on the client-side) is accomplished. Evaluations demonstrate the efficiency and effectiveness of our scheme in handling authentication and registration for a large number of nodes, meanwhile protecting them against various threats to smart living. Finally, we showcase the success of computing intelligence movement towards data sources in handling complicated services. (C) 2020 Published by Elsevier B.V.
引用
收藏
页码:125 / 137
页数:13
相关论文
共 50 条
  • [1] Efficient Authentication Scheme for IoT in Smart Homes
    Srivastava, Animesh
    Saini, Parveen Kumar
    Singh, Gulbir
    Kumar, Gautam
    Dhondiyal, Shiv Ashish
    [J]. 2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023, 2023, : 312 - 315
  • [2] A secure authentication scheme for IoT application in smart home
    Pankaj Kumar
    Lokesh Chouhan
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 420 - 438
  • [3] A secure authentication scheme for IoT application in smart home
    Kumar, Pankaj
    Chouhan, Lokesh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 420 - 438
  • [4] Scalable and efficient authentication scheme for secure smart grid communication
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. IET NETWORKS, 2020, 9 (04) : 165 - 169
  • [5] Light Weight Authentication Scheme for Smart Home IoT Devices
    Kumar, Vipin
    Malik, Navneet
    Singla, Jimmy
    Jhanjhi, N. Z.
    Amsaad, Fathi
    Razaque, Abdul
    [J]. CRYPTOGRAPHY, 2022, 6 (03)
  • [6] Scalable Group Audio-Based Authentication Scheme for IoT Devices
    Gu, Zhong-lei
    Liu, Yang
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 277 - 281
  • [7] Mutual authentication scheme for smart devices in IoT-enabled smart home systems
    Ma, Qingru
    Tan, Haowen
    Zhou, Tianqi
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [8] A Trusted Authentication Scheme for IoT-based Smart Grid Applications
    Amsaad, Fathi
    Kose, Selcuk
    [J]. 2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [9] Fast Real-Time Authentication Scheme for Smart Grids
    Ghosh, Sumit
    Ruj, Sushmita
    [J]. IOTSEC'17: PROCEEDINGS OF THE ACM WORKSHOP ON INTERNET OF THINGS (IOT) SECURITY: ISSUES AND INNOVATIONS, 2017,
  • [10] A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications
    Chen, Fei
    Xiao, Zixing
    Xiang, Tao
    Fan, Junfeng
    Truong, Hong-Linh
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2221 - 2237