A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment | ||
Engineering and Technology Journal | ||
Article 4, Volume 37, 5A, May 2019, Pages 172-180 PDF (1.1 M) | ||
Document Type: Research Paper | ||
DOI: 10.30684/etj.37.5A.4 | ||
Authors | ||
Maytham Azhar; Amin H. Seno | ||
Ferdowsi University of Mashhad | ||
Abstract | ||
In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized in medical and everyday environments. With the promise of IoT's proactive systems, the integration of smart things into standard Internet creates several security challenges, because most Internet technologies, communication protocols and sensors are not designed to support IoT. Recent research studies have shown that launching security / privacy attacks against IoT active systems, in particular, Wearable Medical Sensor (WMS) systems, may lead to catastrophic situations and life-threatening conditions. Therefore, security threats and privacy concerns in the IoT area should be actively studied. This causes us in this paper to create a privacy authentication protocol for IoT end-devices on a four-layer structure that does not have the ability to accurately identify the device of request's sender so that some attacks can be minimized. We used the Blakley Sharing scheme to design a key generation and distribution system for secure communications between edge devices and end devices and examined the security properties of the protocol for the five common attacks in the IoT. The results of the experiments show that the proposed authentication protocol by the Blakley method is more efficient with increasing number of instructions in both fog structures and in a without fog structure, which shows a higher flexibility of the Blakley method than the Schemer because of the increasing number of instructions indicating increasing the number of nodes in the network. | ||
Keywords | ||
Internetof Things; (IoT); security; privacy; authentication; Blak ley Sharing scheme | ||
References | ||
[1]. F. Xia, L.T. Yang, L. Wang and A. Vinel, “Internet of things,” International Journal of Communication Systems Vol. 25, No. 9, pp. 1101-1102, 2012. [2]. H. Kopetz, “Internet of things,” In Real-time systems, PP. 307-323, 2011. [3]. Z. Wang, “A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity,” Future Generation Computer Systems, 2017. [4]. J. Kurihara, S. Kiyomoto, K. Fukushima and T. Tanaka, “A new (k, n)-threshold secret sharing scheme and its extension,” In International Conference on Information Security, PP. 455-470, 2008. [5]. YL. Zhao, “Research on data security technology in internet of things,” In Applied Mechanics and Materials, Vol. 433, N0. 1, pp.1752-1755, 2013. [6]. T. Kothmayr, C. Schmitt, W. Hu, M. Brünig and G. Carle, “DTLS based security and two-way authentication for the Internet of Things,” Ad Hoc Networks Vol.11, N0. 8, pp.2710-2723, 2013. [7]. M. Turkanović, B. Brumen and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks Vol.20, pp.96-112, 2014 [8]. JY. Lee, WC. Lin and YH. Huang, “A lightweight authentication protocol for internet of things,” In NextGeneration Electronics (ISNE), 2014 International Symposium on, pp.1-2, 2014. [9]. R. Roman, C. Alcaraz, J. Lopez and N. Sklavos, “Key management systems for sensor networks in the context of the Internet of Things,” Computers & Electrical Engineering Vol.37, No. 2, pp.147-159, 2011. [10]. H. Gupta, A. Vahid Dastjerdi, SK. Ghosh and R. Buyya, “iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments,” Software: Practice and Experience Vol.47, No. 9, pp. 1275-1296, 2017. [11]. A. Shamir, “How to share a secret,” Communications of the ACM Vol. 22, No. 11, pp. 612-613, 1979. [12]. GR. Blakley, “Safeguarding cryptographic keys,” In Proceedings of the national computer conference, Vol. 48, pp. 313-317, 1979. | ||
Statistics Article View: 238 PDF Download: 157 |