A Novel Secure Authentication Scheme for Heterogeneous Internet of Things

Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a wide range of industry sectors such as healthcare, transportation and some critical infrastructures. With the widespread applications of IoT technology, people's lives have changed dramatically. Due to its capabilities of sensitive data-aware, information collection, communication and processing, it raises security and privacy concerns. Moreover, a malicious attacker may impersonate a legitimate user, which may cause security threat and violation privacy. In allusion to the above problems, we propose a novel and lightweight anonymous authentication and key agreement scheme for heterogeneous IoT, which is innovatively designed to shift between the public key infrastructure (PKI) and certificateless cryptography (CLC) environment. The proposed scheme not only achieves secure communication among the legal authorized users, but also possesses more attributes with user anonymity, non-repudiation and key agreement fairness. Through the security analysis, it is proved that the proposed scheme can resist replay attacks and denial of service (DOS) attacks. Finally, the performance evaluation demonstrates that our scheme is more lightweight and innovative.

[1]  Yi Luo,et al.  Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT , 2018, Secur. Commun. Networks.

[2]  Li Yong Key establishment and authentication scheme for heterogeneous integrated network based on CPK , 2009 .

[3]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[4]  Artemis Moroni,et al.  Vision and Challenges for Realising the Internet of Things , 2010 .

[5]  Wenhao Wang,et al.  A Replay-Attack Resistant Authentication Scheme for the Internet of Things , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[6]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[7]  Kaizhi Huang,et al.  CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network , 2008, 2008 International Conference on Computer Science and Software Engineering.

[8]  S. B. Thorat,et al.  Lightweight Anonymity-Preserving Authentication and Key Agreement Protocol for the Internet of Things Environment , 2017 .

[9]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[10]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[11]  Saru Kumari,et al.  An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.

[12]  Xiaojiang Du,et al.  QoS routing based on multi-class nodes for mobile ad hoc networks , 2004, Ad Hoc Networks.

[13]  Chao Liu,et al.  An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[14]  Anthony Mackitz Dzisoo,et al.  Heterogeneous Identity-based to certificate less online/offline signcryption , 2015 .

[15]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[16]  Hamid Mala,et al.  A new lightweight authentication and key agreement protocol for Internet of Things , 2016, 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).

[17]  Ping Wang,et al.  Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity , 2015, Inf. Sci..

[18]  Xiong Li,et al.  A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security , 2017, J. Ambient Intell. Humaniz. Comput..

[19]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[20]  Xiaojiang Du,et al.  Designing efficient routing protocol for heterogeneous sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[21]  Yong Xu,et al.  Hybrid key management scheme for preventing man-in-middle attack in heterogeneous sensor networks , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[22]  Li Li,et al.  A provably secure password-based anonymous authentication scheme for wireless body area networks , 2017, Comput. Electr. Eng..

[23]  Fei Dai,et al.  Load Balance and Energy Efficient Data Gathering in Wireless Sensor Networks , 2006, MASS.

[24]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[25]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[26]  Robert Green,et al.  Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network , 2015, SpringSim.

[27]  Runtong Zhang,et al.  An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Environments , 2013, 2013 16th International Conference on Network-Based Information Systems.

[28]  Xiaojiang Du,et al.  Adaptive cell relay routing protocol for mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.

[29]  Magdy A. Bayoumi,et al.  A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[30]  Chandra Sekhar Vorugunti,et al.  A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN , 2014, 2014 Fourth International Conference of Emerging Applications of Information Technology.

[31]  Mohsen Guizani,et al.  Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[32]  Zahid Mahmood,et al.  Lightweight Two-Level Session Key Management for End User Authentication in Internet of Things , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[33]  Myung-Hwan Kim,et al.  An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard , 2012, ICISC.