Multilevel authentication protocol for enabling secure communication in Internet of Things

The Internet of Things (IoT) is the domain of interest for researchers with exponential growth in technology. This article develops an authentication protocol based on the Chebyshev polynomial, hashing function, session password, and encryption. The proposed authentication protocol is named as proposed Elliptic, Chebyshev, Session password, and Hash function (ECSH)‐based multilevel authentication. For authenticating the incoming user, there are two phases, registration and authentication. In the registration phase, the user is registered with the server and authentication center (AC), and the authentication follows, which is an eight‐step criterion. The authentication is duly based on the scale factor of the user and server, session password, and verification messages. The authentication at the eight levels assures the security against various types of attacks and renders secure communication in IoT with minimal communication overhead and packet loss. The performance is analyzed using black‐hole, and denial‐of‐service (DOS) attacks with 50 and 100 nodes in the simulation environment. The proposed ECSH‐based multilevel authentication acquired the maximal detection rate, PDR, and QoS of 15.2%, 35.7895%, and 26.4623%, respectively, for 50 nodes with DOS attacks. By contrast, the minimal delay of 135.922 ms is acquired in the presence of 100 nodes and DOS attacks.

[1]  Andrei V. Gurtov,et al.  Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[2]  Guangxia Xu,et al.  SDN-Based Data Transfer Security for Internet of Things , 2018, IEEE Internet of Things Journal.

[3]  Fei Song,et al.  A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios , 2018, Sensors.

[4]  Jianfeng Chu,et al.  A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment , 2020, Symmetry.

[5]  Ahthasham Sajid,et al.  A Secure Communication in IoT Enabled Underwater and Wireless Sensor Network for Smart Cities , 2020, Sensors.

[6]  Yousaf Bin Zikria,et al.  A secure and lightweight authentication scheme for next generation IoT infrastructure , 2021, Comput. Commun..

[7]  Chao Li,et al.  A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment , 2020, IEEE Access.

[8]  Sumit Kumar,et al.  Internet of Vehicles over Vanets: Smart and Secure Communication using IoT , 2020, Scalable Comput. Pract. Exp..

[9]  Sudeep Tanwar,et al.  Secure data dissemination techniques for IoT applications: Research challenges and opportunities , 2020, Softw. Pract. Exp..

[10]  Ruhul Amin,et al.  Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.

[11]  Mohsen Guizani,et al.  StabTrust—A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks , 2020, IEEE Access.

[12]  Saru Kumari,et al.  Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things , 2021, IEEE Access.

[13]  Jingcheng Wang,et al.  An improved mutual authentication and key update scheme for Multi-Hop Relay in internet of things , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).

[14]  Sherali Zeadally,et al.  Securing Internet of Things with Software Defined Networking , 2018, IEEE Communications Magazine.

[15]  Moayad Aloqaily,et al.  An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.

[16]  M. Barbari,et al.  Correlation between egg quality parameters, housing thermal conditions and age of laying hens , 2017 .

[17]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[18]  Laurence T. Yang,et al.  Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.

[19]  Jinzhao Lin,et al.  NoSQL: Confidential on Data Security and Data Management by Using a Mobile Application , 2016 .

[20]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[21]  Mohammad Ayoub Khan,et al.  A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data , 2020, IEEE Access.

[22]  YoHan Park,et al.  Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments , 2019, Sensors.

[23]  Jingsha He,et al.  LA-Based Approach for IoT Security , 2017, J. Robotics Netw. Artif. Life.

[24]  Abderrezak Rachedi,et al.  A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..

[25]  S. ChithraR Enhanced WOA and Modular Neural Network for Severity Analysis of Tuberculosis , 2019, Multimedia Research.

[26]  Jinzhao Lin,et al.  NoSQL Injection: Data Security on Web Vulnerability , 2016 .

[27]  Jong Hyuk Park,et al.  Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography , 2019, Applied Sciences.

[28]  Masoumeh Safkhani,et al.  ECCbAP: A secure ECC-based authentication protocol for IoT edge devices , 2020, Pervasive Mob. Comput..

[29]  Wuxiong Zhang,et al.  Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey , 2020, Wirel. Commun. Mob. Comput..

[30]  Limengnan Zhou,et al.  A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication , 2021, IEEE Access.

[31]  Jongsung Kim,et al.  A secure ECC-based RFID mutual authentication protocol for internet of things , 2016, The Journal of Supercomputing.

[32]  Biplab Sikdar,et al.  Mutual Authentication in IoT Systems Using Physical Unclonable Functions , 2017, IEEE Internet of Things Journal.

[33]  P. Mohamed Shakeel,et al.  A decentralized scalable security framework for end‐to‐end authentication of future IoT communication , 2019, Trans. Emerg. Telecommun. Technol..

[34]  Zhiwei Wang,et al.  A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity , 2017, Future Gener. Comput. Syst..

[35]  A. Gopi,et al.  Secure Communication in Internet of Things , 2017 .

[36]  Fadi Al-Turjman,et al.  A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems , 2020, IEEE Access.

[37]  Hemn B. Abdalla,et al.  Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data , 2020, KSII Trans. Internet Inf. Syst..

[38]  Ioannis Papaefstathiou,et al.  SCOTRES: Secure Routing for IoT and CPS , 2017, IEEE Internet of Things Journal.

[39]  Victor I. Chang,et al.  A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..

[40]  Hakim Allali,et al.  Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology , 2020 .

[41]  Saru Kumari,et al.  A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things , 2019, Int. J. Commun. Syst..

[42]  Ram Mohan Chintalapalli,et al.  Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization , 2019, Int. J. Model. Simul. Sci. Comput..

[43]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[44]  Antonella Molinaro,et al.  From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols , 2011, IEEE Communications Surveys & Tutorials.

[45]  Rajesh S. Prasad,et al.  Multi-objective fractional gravitational search algorithm for energy efficient routing in IoT , 2019, Wirel. Networks.

[46]  Daniel Díaz Sánchez,et al.  Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies , 2017, Future Gener. Comput. Syst..

[47]  Ilda de Fátima Ferreira Tinôco,et al.  Evaluation of the surface temperature of laying hens in different thermal environments during the initial stage of age based on thermographic images. , 2017 .

[48]  Tanweer Alam Efficient and Secure Data Transmission Approach in Cloud-MANET-IoT Integrated Framework , 2020 .

[49]  Jong Hyuk Park,et al.  A deep learning-based IoT-oriented infrastructure for secure smart City , 2020 .

[50]  Sayan Kumar Ray,et al.  SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..

[51]  Charalampos Manifavas,et al.  Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems , 2012, 2012 16th Panhellenic Conference on Informatics.

[52]  G. P. Biswas,et al.  A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography , 2020, The Journal of Supercomputing.

[53]  Andrei V. Gurtov,et al.  PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.

[54]  Xiaoyong Li,et al.  A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion , 2018, IEEE Access.