Energy efficient integrated authentication and access control mechanisms for Internet of Things

Internet of Things is seen as one of the advance paradigm in widespread applications, and also in upcoming generations of ICT. Due to the heterogeneous nature of the Internet of Things, challenges concern for security and with privacy must be considered during the design of IoT. Access control and authentication are two key techniques in this context to ensure secure communication between IoT devices. For this purpose, IoT devices should be secure and lightweight in nature. In this paper, we present the Elliptic Curve Cryptography based Mutual Authentication (EMA) and Capability Based Access Control (CBAC) model to ensure secure authorization along with protocol evaluation and performance analysis. The protocol is evaluated by using the AVISPA tool which is a security protocol verification tool, shows that EMA and CBAC are secure against attacks. Further, the details of performance analysis in terms of running or execution time and energy consumption are discussed and compared with other existing protocols.

[1]  Elliot K. Kolodner,et al.  Scalable Computing: Practice and Experience , 2011 .

[2]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[3]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[4]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[5]  Jingcheng Wang,et al.  A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.

[6]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[7]  Artemis Moroni,et al.  Vision and Challenges for Realising the Internet of Things , 2010 .

[8]  Gang Gan,et al.  Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.

[9]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[10]  Hui Shi,et al.  A Communication Protocol of RFID Systems in Internet of Things , 2012 .

[11]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[12]  P. Hartvigsen The Computer for the 21st Century (1991) , 2014 .

[13]  Mark Weiser The computer for the 21st century , 1991 .

[14]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[15]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[16]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[17]  Liangmin Wang,et al.  Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection , 2012, J. Networks.

[18]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[19]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[20]  Mihir Bellare,et al.  The Security of Cipher Block Chaining , 1994, CRYPTO.

[21]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[22]  Ramjee Prasad,et al.  Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[23]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.