Internet of things' authentication and access control

The Internet of Things IoT is regarded as the next generation worldwide network that connects every necessary object to facilitate our daily life. Although it is only an abstract concept to some extent, a number of relevant undergoing researches make this blueprint more possible in the near future. Those works involve wired and wireless sensor networks, mobile ad-hoc network, radio frequency identification, ubiquitous computing, etc. Due to the inherent vulnerabilities of the internet, security and privacy issues should be considered and addressed before the IoT is widely deployed. Authentication and access control are two key techniques to prevent a computer or network component from being compromised. This paper mainly analyses existing authentication and access control methods, and then, it designs a feasible one for the IoT. Potential future directions are discussed at the end of this paper.

[1]  Xuemin Shen,et al.  A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.

[2]  Yiming Wang,et al.  Error analysis of range-based localisation algorithms in wireless sensor networks , 2012, Int. J. Sens. Networks.

[3]  Amardeo Sarma,et al.  Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..

[4]  Myung J. Lee,et al.  A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.

[5]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[6]  Rajeev Tripathi,et al.  Optimal number of clusters in wireless sensor networks: An FCM approach , 2010 .

[7]  Shouling Ji,et al.  Data caching-based query processing in multi-sink wireless sensor networks , 2012, Int. J. Sens. Networks.

[8]  Ma Jian-feng,et al.  An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[9]  Nahid Shahmehri,et al.  2-clickAuth Optical Challenge-Response Authentication , 2010, 2010 International Conference on Availability, Reliability and Security.

[10]  Wei Wang,et al.  Constructing minimum interference connected dominating set for multi-channel multi-radio multi-hop wireless network , 2012, Int. J. Sens. Networks.

[11]  Sven Laur,et al.  User-aided data authentication , 2009, Int. J. Secur. Networks.

[12]  Li Liu,et al.  A Virtual Password Scheme to Protect Passwords , 2008, 2008 IEEE International Conference on Communications.

[13]  Mohamed F. Younis,et al.  Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks , 2012, Int. J. Sens. Networks.

[14]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[15]  Abdelsalam Helal,et al.  Optimal and distributed algorithms for coverage hole healing in hybrid sensor networks , 2012, Int. J. Sens. Networks.

[16]  Xiaojiang Du,et al.  Weaving a proper net to catch large objects in wireless sensor networks , 2010, IEEE Transactions on Wireless Communications.

[17]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[18]  Naixue Xiong,et al.  Distributed k-connected fault-tolerant topology control algorithms with PSO in future autonomic sensor systems , 2012, Int. J. Sens. Networks.

[19]  Bo Sheng,et al.  Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[20]  Yang Xiao,et al.  A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID , 2011, Wirel. Commun. Mob. Comput..

[21]  Yang Xiao,et al.  A Lightweight Secure Solution for RFID. , 2006 .

[22]  Daisuke Takahashi,et al.  Wireless telemedicine and m-health: technologies, applications and research issues , 2011, Int. J. Sens. Networks.

[23]  Yi Pan,et al.  Load-balanced CDS construction in wireless sensor networks via genetic algorithm , 2012, Int. J. Sens. Networks.

[24]  Bo Chen,et al.  A high computational power wireless sensor network for distributed structural health monitoring , 2012, Int. J. Sens. Networks.

[25]  Bodo Möller,et al.  Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol , 2007, Int. J. Secur. Networks.

[26]  Victor C. M. Leung,et al.  Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[27]  Eyal de Lara,et al.  Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.

[28]  Hui-Feng Huang,et al.  A novel access control protocol for secure sensor networks , 2009, Comput. Stand. Interfaces.

[29]  Qun Li,et al.  Distributed User Access Control in Sensor Networks , 2006, DCOSS.

[30]  Rolf H. Weber,et al.  Internet of things - Need for a new legal environment? , 2009, Comput. Law Secur. Rev..

[31]  Fei Hu,et al.  Towards a Secure, RFID / Sensor Based Telecardiology System , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[32]  Sunghyun Choi,et al.  Two-level protection and guarantee for multimedia traffic in IEEE 802.11e distributed WLANs , 2009, Wirel. Networks.

[33]  Manikanden Balakrishnan,et al.  Preemptive emergency medium access for wireless sensor networks: performance under realistic network conditions , 2012, Int. J. Sens. Networks.

[34]  Young H. Cho,et al.  Water temperature sensing with microtomography , 2012, Int. J. Sens. Networks.

[35]  Yang Xiao,et al.  Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft , 2014, IEEE Systems Journal.

[36]  Yang Xiao,et al.  Secret Little Functions and Codebook for Protecting Users from Password Theft , 2008, 2008 IEEE International Conference on Communications.

[37]  Yang Xiao,et al.  Studying the stochastic capturing of moving intruders by mobile sensors , 2012, Comput. Math. Appl..

[38]  Wang Huan,et al.  Studying on internet of things based on fingerprint identification , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[39]  Yu-Chee Tseng,et al.  Exploiting spatial correlation at the link layer for event-driven sensor networks , 2012, Int. J. Sens. Networks.

[40]  Zinaida Benenson,et al.  An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[41]  Bo Li,et al.  Dynamic Bandwidth Partition with Finer-Tune (DP-FT) Scheme for Multimedia IEEE 802.11e WLANs , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[42]  Jie Wu,et al.  Impacts of sensor node distributions on coverage in sensor networks , 2011, J. Parallel Distributed Comput..

[43]  Tai-Myung Chung,et al.  Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure , 2011, IEEE Transactions on Vehicular Technology.

[44]  Tassos Dimitriou,et al.  Scatter - secure code authentication for efficient reprogramming in wireless sensor networks , 2011, Int. J. Sens. Networks.

[45]  Guoliang Xue,et al.  Authenticating strangers in Online Social Networks , 2011, Int. J. Secur. Networks.

[46]  Ju Wang,et al.  A cross-layer authentication design for secure video transportation in wireless sensor network , 2010, Int. J. Secur. Networks.

[47]  Ming-Hour Yang,et al.  Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.

[48]  R. C. Hansdah,et al.  A Weighted Average Based External Clock Synchronization Protocol for Wireless Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.

[49]  Jong-Wook Han,et al.  Intelligent Pervasive Network Authentication: S/Key Based Device Authentication , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[50]  Xuemin Shen,et al.  Energy-efficient transmission and bit allocation schemes in wireless sensor networks , 2012, Int. J. Sens. Networks.

[51]  Ahmed Helmy,et al.  Gauging human mobility characteristics and its impact on mobile routing performance , 2012, Int. J. Sens. Networks.

[52]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[53]  Yang Xiao,et al.  Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[54]  Dominik Henrich,et al.  Optimal camera placement to measure distances regarding static and dynamic obstacles , 2012, Int. J. Sens. Networks.

[55]  Yang Xiao,et al.  Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks , 2011, Cluster Computing.

[56]  Yuguang Fang,et al.  Access control in wireless sensor networks , 2007, Ad Hoc Networks.

[57]  Yang Xiao,et al.  Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags , 2011, Wirel. Commun. Mob. Comput..

[58]  Wei-Tek Tsai,et al.  Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.

[59]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[60]  Moustafa Youssef,et al.  A source authentication scheme using network coding , 2011, Int. J. Secur. Networks.

[61]  Yang Xiao,et al.  Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access , 2004, IEEE Transactions on Parallel and Distributed Systems.

[62]  Rachid Beghdad Efficient coverage protocol without location information , 2012, Int. J. Sens. Networks.

[63]  D. K. Lobiyal,et al.  An energy-efficient adaptive clustering algorithm with load balancing for wireless sensor network , 2012, Int. J. Sens. Networks.

[64]  Salah A. Aly Distributed data collection and storage algorithms for collaborative learning vision sensor devices with applications to pilgrimage , 2012, Int. J. Sens. Networks.

[65]  Christian Callegari,et al.  Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods , 2012, Int. J. Sens. Networks.

[66]  Li Wern Chew,et al.  Low memory image stitching and compression for WMSN using strip-based processing , 2012, Int. J. Sens. Networks.

[67]  Won-Tae Kim,et al.  Many-to-one communication protocol for wireless sensor networks , 2012, Int. J. Sens. Networks.

[68]  Bo Li,et al.  Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-Based WLANs , 2007, IEEE Transactions on Mobile Computing.

[69]  Guihai Chen,et al.  Efficient median estimation for large-scale sensor RFID systems , 2012, Int. J. Sens. Networks.

[70]  Xueyan Tang,et al.  An efficient data collection scheme through multi-path routing structures in wireless sensor networks , 2012, Int. J. Sens. Networks.

[71]  Li-Minn Ang,et al.  Low-memory video compression architecture using strip-based processing for implementation in wireless multimedia sensor networks , 2012, Int. J. Sens. Networks.

[72]  Gang Liu,et al.  Cooperative relay assignment for static energy-constrained networks , 2012, Int. J. Sens. Networks.

[73]  Krishna M. Sivalingam,et al.  An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.

[74]  Ying Zhang,et al.  Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.

[75]  David Grau,et al.  Automatically tracking engineered components through shipping and receiving processes with passive identification technologies , 2012 .

[76]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[77]  Huaxiong Wang,et al.  Efficient multicast stream authentication for the fully adversarial network model , 2007, Int. J. Secur. Networks.

[78]  Yang Xiao QoS guarantee and provisioning at the contention-based wireless MAC layer in the IEEE 802.11e wireless LANs , 2006, IEEE Wirel. Commun..

[79]  Yang Xiao,et al.  Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..

[80]  Shiuh-Pyng Shieh,et al.  Authentication and secret search mechanisms for RFID-aware wireless sensor networks , 2010, Int. J. Secur. Networks.

[81]  Yang Xiao IEEE 802.11e: QoS provisioning at the MAC layer , 2004, IEEE Wirel. Commun..

[82]  Yang Xiao,et al.  Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..

[83]  Yang Xiao,et al.  The effect of leaders on the consistency of group behaviour , 2012, Int. J. Sens. Networks.

[84]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[85]  Ali Movaghar-Rahimabadi,et al.  Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.

[86]  Yang Xiao,et al.  Bio-inspired communications among robots, sensors, and RFID tags , 2009, 2009 International Conference on Mechatronics and Automation.

[87]  Toufik Ahmed,et al.  Streaming multimedia over WMSNs: an online multipath routing protocol , 2012, Int. J. Sens. Networks.

[88]  Hsiao-Hwa Chen,et al.  DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.

[89]  Kee-Young Yoo,et al.  Efficient and Secure Password Authentication Schemes for Low-Power Devices , 2005, MSN.

[90]  CongDuc Pham Coverage and activity management of wireless video sensor networks for surveillance applications , 2012, Int. J. Sens. Networks.

[91]  Yang Xiao,et al.  Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[92]  Fei Hu,et al.  Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .

[93]  Xiong Li,et al.  Research on the Architecture of Trusted Security System Based on the Internet of Things , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

[94]  Yang Xiao,et al.  Analysis of energy consumption for multiple object identification system with active RFID tags , 2008 .

[95]  Xiaojiang Du,et al.  Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks , 2009, Comput. Networks.

[96]  Sumit Kundu,et al.  Optimal transmit power and packet size in wireless sensor networks in lognormal shadowed environment , 2012, Int. J. Sens. Networks.

[97]  Mohammed G. H. al Zamil,et al.  Dispersion-based prediction framework for estimating missing values in wireless sensor networks , 2012, Int. J. Sens. Networks.

[98]  William Stallings,et al.  Cryptography and network security , 1998 .

[99]  Hrishikesh B. Acharya,et al.  Is That You? Authentication in a Network without Identities , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[100]  Joos Vandewalle,et al.  Overview of authentication protocols , 1997, Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology.

[101]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[102]  Meng Wu,et al.  Research on security management for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[103]  Weili Wu,et al.  A constant-factor approximation for d-hop connected dominating sets in unit disk graph , 2012, Int. J. Sens. Networks.

[104]  Jorge Sá Silva,et al.  Mobile multimedia in wireless sensor networks , 2012, Int. J. Sens. Networks.

[105]  Deying Li,et al.  An approximation algorithm for dominating nodes selection in multi-channel multi-radio wireless sensor networks , 2012, Int. J. Sens. Networks.