Security Enhancement on a Lightweight Authentication Scheme With Anonymity Fog Computing Architecture

The multi-level, heterogeneous and third-party attributes of fog computing (FC) have caused great concern in the communication security of next-generation IoT systems. This paper proposes a secure authentication scheme for dynamic key generation capability, which can enhance the security of the entire heterogeneous network without the constraints on device types, attributes and communication protocols. The communication devices exchange IDs and random numbers for registration, then generate anonymous information. During the authentication process, the cloud device (e.g., the server) uses the pseudonym information to match the recorded random numbers. Both FC devices utilize the protocol with such random numbers to generate session keys and deliver updated random numbers. Comprehensive security and performance analysis shows that the scheme can meet the security requirements of the FC architecture with lower overhead.

[1]  An Braeken,et al.  Efficient Anonym Smart Card Based Authentication Scheme for Multi-Server Architecture , 2015 .

[2]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[3]  Sneha Kumar Kasera,et al.  Secret key extraction using Bluetooth wireless signal strength measurements , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[4]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[5]  R. Velayutham,et al.  Security Authentication through AES and fine-grained distributed Data Access Control using clustering in Wireless Sensor Networks , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[6]  Andrei Gurtov,et al.  Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[8]  MengChu Zhou,et al.  Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..

[9]  Balasubramaniam Natarajan,et al.  Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Dimitrios Makrakis,et al.  Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[11]  Saman A. Zonouz,et al.  CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..

[12]  Gohar Rahman,et al.  Mutual Authentication Security Scheme in Fog Computing , 2019 .

[13]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[14]  Christof Paar,et al.  Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[15]  Marco Chiani,et al.  Secret key extraction from a UWB channel: Analysis in a real environment , 2014, 2014 IEEE International Conference on Ultra-WideBand (ICUWB).

[16]  Shaojie Tang,et al.  KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).

[17]  Mohsen Guizani,et al.  LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT , 2019, IEEE Internet of Things Journal.

[18]  Kai Zeng,et al.  Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[19]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.

[20]  Abdenour Bouzouane,et al.  Correct by Construction Security Approach to Design Fault Tolerant Smart Homes for Disabled People , 2013, EUSPN/ICTH.

[21]  Mohamed Abid,et al.  A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).

[22]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[23]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[24]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[25]  Xiuzhen Cheng,et al.  Lightweight Hardware Based Secure Authentication Scheme for Fog Computing , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).

[26]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[27]  Mauro Conti,et al.  Provably Secure Authenticated Key Agreement Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.

[28]  Shucheng Yu,et al.  Efficient privacy-preserving biometric identification in cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.

[29]  Alessandro Armando,et al.  Deliverable D2.1: the High Level Protocol Specification Language Deliverable Details Project Details , 2022 .

[30]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[31]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[32]  Ning Wang,et al.  Physical Layer Key Generation in 5G Wireless Networks , 2019, IEEE Wireless Communications.

[33]  Lein Harn,et al.  Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN) , 2019, Secur. Commun. Networks.

[34]  Taeshik Shon,et al.  A novel secure key paring protocol for RF4CE ubiquitous smart home systems , 2012, Personal and Ubiquitous Computing.

[35]  Matthew C. Valenti,et al.  A Framework for Secure Cloud-Empowered Mobile Biometrics , 2014, 2014 IEEE Military Communications Conference.

[36]  Maged Hamada Ibrahim,et al.  Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..

[37]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[38]  Qiang Li,et al.  Towards fast and lightweight spam account detection in mobile social networks through fog computing , 2018, Peer Peer Netw. Appl..

[39]  Lein Harn,et al.  Hierarchical Polynomial-Based Key Management Scheme in Fog Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[40]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[41]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.