A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications

Internet of Things (IoT) authentication for resource-constrained devices thrives under lightweight solutions. The requirements of the lightweight solutions are that, they have to meet the processing, storage and limited resource base of the resource-constrained devices. There are a number of lightweight solutions advanced for IoT under different domains. To provide feasible authentication solutions for smart home security calls for focus on key attributes that suit the domain in question. This paper is positioned to give a review of some existing lightweight authentication schemes, guide the selection and design of best possible solutions that can be applied to smart home environments. From the costing of randomly selected lightweight authentication techniques, the least costly solution is recommended for adoption.

[1]  Vijay Sivaraman,et al.  Low-cost flow-based security solutions for smart-home IoT devices , 2016, International Workshop on Ant Colony Optimization and Swarm Intelligence.

[2]  Jen-Ho Yang,et al.  A user authentication scheme on multi-server environments for cloud computing , 2013, 2013 9th International Conference on Information, Communications & Signal Processing.

[3]  Qusay H. Mahmoud,et al.  A context-aware authentication framework for smart homes , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[4]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[5]  Derek Abbott,et al.  PUF Sensor: Exploiting PUF Unreliability for Secure Wireless Sensing , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[6]  Azzam Sleit,et al.  Authentication Techniques for the Internet of Things: A Survey , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).

[7]  Sherali Zeadally,et al.  Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.

[8]  Altair Olivo Santin,et al.  An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT , 2014, GLOBECOM 2014.

[9]  Jemal H. Abawajy,et al.  A Multi-protocol Security Framework to Support Internet of Things , 2016, SecureComm.

[10]  Ronggao Zhang An enhanced lightweight authentication protocol for low-cost RFID systems , 2016, 2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT).

[11]  Patrick Schaumont,et al.  Compact and low-power ASIP design for lightweight PUF-based authentication protocols , 2016, IET Inf. Secur..

[12]  Jonghyun Baek,et al.  Secure and Lightweight Authentication Protocol for NFC Tag Based Services , 2015, 2015 10th Asia Joint Conference on Information Security.

[13]  Hossein Gharaee,et al.  Lightweight, anonymous and mutual authentication in IoT infrastructure , 2016, 2016 8th International Symposium on Telecommunications (IST).

[14]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[15]  Woody Sherman,et al.  Improved Docking of Polypeptides with Glide , 2013, J. Chem. Inf. Model..

[16]  Walid Saad,et al.  On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[17]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[18]  Jiyong Han Chaining the secret: Lightweight authentication for security in pervasive computing , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[19]  Srinivas Sampalli,et al.  Lightweight protocol for anonymity and mutual authentication in RFID systems , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[20]  Jemal H. Abawajy,et al.  Secure Object Tracking Protocol for the Internet of Things , 2016, IEEE Internet of Things Journal.

[21]  Jonathan Margulies Garage Door Openers: An Internet of Things Case Study , 2015, IEEE Security & Privacy.

[22]  Bilhanan Silverajan,et al.  Collaborative cloud-based management of home networks , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[23]  Jian Shen,et al.  A Lightweight Mutual Authentication Scheme for User and Server in Cloud , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).

[24]  Dave Parry,et al.  A lightweight authentication scheme for transport system farecards , 2016, 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA).

[25]  Nan Zhang,et al.  A lightweight authentication and authorization solution based on Kerberos , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).

[26]  Djamel Tandjaoui,et al.  A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things , 2016, 2016 Wireless Telecommunications Symposium (WTS).

[27]  T. Tantidham,et al.  HIVE: Home Automation System for Intrusion Detection , 2016, 2016 Fifth ICT International Student Project Conference (ICT-ISPC).

[28]  Jen-Ho Yang,et al.  An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[29]  Chen Shen,et al.  Low-complexity Scalable Authentication algorithm with Imperfect Shared Keys for Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[30]  Jemal H. Abawajy,et al.  Universal and secure object ownership transfer protocol for the Internet of Things , 2018, Future Gener. Comput. Syst..

[31]  Weidong Yang,et al.  A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks , 2014, GLOBECOM 2014.

[32]  Prosanta Gope,et al.  Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks , 2016, IEEE Systems Journal.

[33]  Sayidul Morsalin,et al.  Machine-to-machine communication based smart home security system by NFC, fingerprint, and PIR sensor with mobile android application , 2016, 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).

[34]  Srinivas Devadas,et al.  A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication , 2016, IEEE Transactions on Multi-Scale Computing Systems.

[35]  Chuck Yoo,et al.  DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).

[36]  Xuemin Shen,et al.  Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections , 2017, IEEE Transactions on Vehicular Technology.

[37]  Rune Hylsberg Jacobsen,et al.  Towards the Use of Pairing-Based Cryptography for Resource-Constrained Home Area Networks , 2015, 2015 Euromicro Conference on Digital System Design.

[38]  Gerhard P. Hancke,et al.  Smartphone: The key to your connected smart home , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).

[39]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[40]  Gang Qu,et al.  VOLtA: Voltage over-scaling based lightweight authentication for IoT applications , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).

[41]  Xiaolin Xu,et al.  LADP: A lightweight authentication and delegation protocol for RFID tags , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.

[42]  Yang Liu,et al.  Leveraging carbon nanotube technologies in developing Physically Unclonable Function for cyber-physical system authentication , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[43]  Tadayoshi Kohno,et al.  Computer security and the modern home , 2013, CACM.

[44]  Djamal Zeghlache,et al.  Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.

[45]  Andrei Gurtov,et al.  Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.

[46]  Hamid Mala,et al.  A new lightweight authentication and key agreement protocol for Internet of Things , 2016, 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).

[47]  Panchami V,et al.  BISC authentication algorithm: An efficient new authentication algorithm using three factor authentication for mobile banking , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[48]  Li-Chun Wang,et al.  Lightweight Authentication Mechanism for Software Defined Network Using Information Hiding , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[49]  Ragib Hasan,et al.  HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).

[50]  Jheng-Jia Huang,et al.  Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments , 2016, MobiQuitous.

[51]  Muhammad Khurram Khan,et al.  Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.

[52]  Liehuang Zhu,et al.  2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.