Cloud-centric multi-level authentication as a service for secure public safety device networks

With the advances in IoT, future public safety responders will be well armed with devices that pump data between on-site responders and command centers, carrying useful information about the event scene, the status of a mission, and helping critical decisions to be made in real time. In addition, wearable and on-body sensors will monitor the vital signals and well being of the responders. These connected devices or the so-called IoT surrounding public safety responders generate highly vulnerable data, where security breaches may have life threatening consequences. Authentication of responder devices is essential in order to control access to public safety networks. Most of the existing authentication schemes do not scale well with the large number of devices of IoT, and are not fast enough to work during time-critical public safety missions. On the other hand, for general IoT services, cloud-based solutions provide unlimited resources for storing and accessing IoT data. However, the cloud may have some implications for sensitive data that are collected for public safety. Therefore, authentication solutions are desired to integrate well into the cloud environment. In this article, we propose cloud-centric, multi-level authentication as a service approach that addresses scalability and time constraints, and demonstrate its effectiveness. We draw future research directions for secure public safety networks in the presence of IoT devices and the cloud.

[1]  Burak Kantarci,et al.  Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[2]  R. Venkatesha Prasad,et al.  A scalable distributed architecture towards unifying IoT applications , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[3]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[4]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[5]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[6]  Burak Kantarci,et al.  Towards secure cloud-centric Internet of Biometric Things , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).

[7]  M. Ulema,et al.  A framework for personal mobile agents in wireless pervasive computing environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[8]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[9]  Heejo Lee,et al.  An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography , 2009, Journal of Communications and Networks.

[10]  Thomas Shrimpton,et al.  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.

[11]  Yufeng Wang,et al.  Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks , 2012, Int. J. Secur. Networks.

[12]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[13]  Ragib Hasan,et al.  SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.