Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems

Abstract Session Initiation Protocol (SIP) is a communication protocol of multimedia systems providing IP signaling to initiate instant messaging. The rapid growth of wireless communication has gained momentum for the development of value-added services such as voice, data, and video ubiquitously. Continuous development has emerged in various application domains such as healthcare, surveillance, and automation that integrate the sources of multimedia to support real-time analysis. In mHealth, it has a dedicated multimedia information system (MIS) to support diagnosis, treatment, medicare, and report preparation. It may enable the user to collect the diagnostic information over smart devices. On the other hand, it may eliminate the geographical restriction between users and medical experts to manage medical emergencies. It uses a packet-switched network to cooperate with the wireless infrastructure to provide a standard interface that serves as a data transmission network. However, the communication interface such as real-time transport protocol is still challenging to authenticate the network services, key exchanges, and session blockage in the multimedia systems. Thus, this paper proposes a technique of session scheme interrogation (SSI) and robust lightweight privacy-preserving (RLPP) to resolve the major issues of LTE-A networks. In this paper, the session adaptive strategy is mathematically driven to adopt the session probing in multimedia clients that detects the session blocks proficiently to mitigate the session overheads. Besides, a real-time system has been designed and developed for the analysis of quality metrics such as call success rate, call setup time, end-to-end session delay, RTP utilization, bandwidth consumption, and flooding attack detection rate. The examination results prove that the proposed RLPP and SSI achieve better efficiencies than other existing schemes.

[1]  Sheng Chen,et al.  Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays , 2018, IEEE Transactions on Wireless Communications.

[2]  Rajappa Muthaiah,et al.  Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems , 2015, Multimedia Tools and Applications.

[3]  Liping Zhang,et al.  Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol , 2017, Wirel. Networks.

[4]  Narendra S. Chaudhari,et al.  Efficient and secure modified cocktail-AKA protocol for UMTS network , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).

[5]  Kim-Kwang Raymond Choo,et al.  Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.

[6]  Fadi Al-Turjman,et al.  Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks , 2017, IEEE Access.

[7]  Liping Zhang,et al.  An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks , 2016, J. Netw. Comput. Appl..

[8]  Yan Chen,et al.  RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild , 2020, IEEE Transactions on Mobile Computing.

[9]  P. Zanaboni,et al.  General practitioners’ perceptions towards the use of digital health services for citizens in primary care: a qualitative interview study , 2019, BMJ Open.

[10]  Neetesh Saxena,et al.  Secure-AKA: An Efficient AKA Protocol for UMTS Networks , 2014, Wirel. Pers. Commun..

[11]  Mahmoud Ahmadian-Attari,et al.  An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards , 2016, Int. J. Commun. Syst..

[12]  Deebak Bakkiam David Mutual authentication scheme for multimedia medical information systems , 2017 .

[13]  Mostafa Zaman Chowdhury,et al.  The Role of Optical Wireless Communication Technologies in 5G/6G and IoT Solutions: Prospects, Directions, and Challenges , 2019, Applied Sciences.

[14]  Oluwarotimi Williams Samuel,et al.  A joint resource-aware and medical data security framework for wearable healthcare systems , 2019, Future Gener. Comput. Syst..

[15]  Uzma Mustafa,et al.  Group-Based Key Exchange for Medical IoT Device-to-Device Communication (D2D) Combining Secret Sharing and Physical Layer Key Exchange , 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3).

[16]  Jia Lun Tsai Efficient Nonce-based Authentication Scheme for Session Initiation Protocol , 2009, Int. J. Netw. Secur..

[17]  Maged Hamada Ibrahim,et al.  Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..

[18]  Lixiang Li,et al.  An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography , 2015, Multimedia Tools and Applications.

[19]  Mohammad Sabzinejad Farash Security analysis and enhancements of an improved authentication for session initiation protocol with provable security , 2016, Peer Peer Netw. Appl..

[20]  Yuguang Fang,et al.  Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..

[21]  Youliang Tian,et al.  Constant-round authenticated and dynamic group key agreement protocol for D2D group communications , 2019, Inf. Sci..

[22]  Hung-Min Sun,et al.  EFFICIENT AUTHENTICATION AND KEY AGREEMENT PROCEDURE IN IP MULTIMEDIA SUBSYSTEM FOR UMTS , 2011 .

[23]  Ilias Politis,et al.  On Security Against Pollution Attacks in Network Coding Enabled 5G Networks , 2020, IEEE Access.

[24]  Debiao He Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications , 2011, IACR Cryptol. ePrint Arch..

[25]  Peng Zhang,et al.  Flexible data access control in D2D communications , 2017, Future Gener. Comput. Syst..

[26]  Naveen K. Chilamkurti,et al.  An improved authentication protocol for session initiation protocol using smart card , 2015, Peer Peer Netw. Appl..

[27]  Frederick O. Edeko,et al.  Empirical investigation on the dependence of TCP upstream throughput on SNR in an IEEE802.11b WLAN system , 2014, 2014 21st International Conference on Telecommunications (ICT).

[28]  Zhihua Cai,et al.  Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card , 2014, Int. J. Commun. Syst..

[29]  B. D. Deebak,et al.  Analyzing the mutual authenticated session key in IP multimedia server-client systems for 4G networks , 2016 .

[30]  Nassar Ikram,et al.  Elliptic curve cryptography based mutual authentication scheme for session initiation protocol , 2011, Multimedia Tools and Applications.

[31]  Sudeep Tanwar,et al.  An exhaustive survey on security and privacy issues in Healthcare 4.0 , 2020, Comput. Commun..

[32]  Ruhul Amin,et al.  A robust mutual authentication scheme for session initiation protocol with key establishment , 2018, Peer Peer Netw. Appl..

[33]  Mohamed Abid,et al.  A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).

[34]  Masahiro Mambo,et al.  The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[35]  Morteza Nikooghadam,et al.  Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme , 2018, Multimedia Tools and Applications.

[36]  Muhammad Khurram Khan,et al.  An enhanced privacy preserving remote user authentication scheme with provable security , 2015, Secur. Commun. Networks.

[37]  Jianfeng Ma,et al.  Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al. , 2015, Int. J. Commun. Syst..

[38]  Bakkiam David Deebak Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems , 2016, Wirel. Pers. Commun..

[39]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[40]  Yucong Duan,et al.  Transformation-based processing of typed resources for multimedia sources in the IoT environment , 2019, Wireless Networks.

[41]  Chung-Ming Huang,et al.  Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[42]  Hsiao-Hwa Chen,et al.  A secure and efficient SIP authentication scheme for converged VoIP networks , 2010, Comput. Commun..

[43]  Aiqing Zhang,et al.  Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.

[44]  Sheetal Kalra,et al.  Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things , 2019, Multimedia Tools and Applications.

[45]  Vanga Odelu,et al.  Enhanced Session Initiation Protocols for Emergency Healthcare Applications , 2018, SSCC.

[46]  Xiaohong Jiang,et al.  Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective , 2018, IEEE Transactions on Communications.

[47]  Fadi Al-Turjman,et al.  Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things , 2021, IEEE Journal on Selected Areas in Communications.

[48]  Mariya Ouaissa,et al.  A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks , 2018 .

[49]  Chang,et al.  Light-Weighted Password-Based Multi-Group Authenticated Key Agreement for Wireless Sensor Networks , 2019, Applied Sciences.

[50]  B. D. Deebak,et al.  A Secure-Ware System for Web Server: Ensuring Platform Interoperability, Security, Privacy, Usability and Functionality , 2017 .

[51]  Omar Hayat,et al.  Device Discovery in D2D Communication: A Survey , 2019, IEEE Access.

[52]  Lingyang Song,et al.  D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G System , 2016, IEEE Transactions on Wireless Communications.

[53]  J. Katsoulis,et al.  Computer-assisted, template-guided immediate implant placement and loading in the mandible: a case report , 2019, BMC oral health.

[54]  Jian Wang,et al.  Secure SIP authentication scheme supporting lawful interception , 2013, Secur. Commun. Networks.

[55]  Ibrahim Sogukpinar,et al.  SIP Authentication Scheme using ECDH , 2007 .

[56]  F. Richard Yu,et al.  Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.

[57]  Deepak Puthal,et al.  PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things , 2020, IEEE Internet of Things Journal.

[58]  Rosdiadee Nordin,et al.  A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks , 2016, J. Netw. Comput. Appl..

[59]  Haleh Amintoosi,et al.  A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol , 2019, Secur. Priv..

[60]  Eli Upfal,et al.  Building low-diameter peer-to-peer networks , 2003, IEEE J. Sel. Areas Commun..

[61]  Min-Shiang Hwang,et al.  A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS , 2010 .

[62]  Morteza Nikooghadam,et al.  Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol , 2015, The Journal of Supercomputing.

[63]  Sherali Zeadally,et al.  A Survey of Device-to-Device Communications: Research Issues and Challenges , 2018, IEEE Communications Surveys & Tutorials.

[64]  Caixue Zhou Comments on “Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems” , 2018, IEEE Transactions on Information Forensics and Security.

[65]  Luca Deri,et al.  Effective traffic measurement using ntop , 2000 .

[66]  Saru Kumari,et al.  An improved lightweight multiserver authentication scheme , 2017, Int. J. Commun. Syst..

[67]  Hung-Yu Wei,et al.  Further Enhanced Multimedia Broadcast/Multicast Service in LTE-Advanced Pro , 2019, IEEE Communications Standards Magazine.

[68]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[69]  Angela Orebaugh,et al.  Wireshark & Ethereal Network Protocol Analyzer Toolkit , 2007 .

[70]  Guoai Xu,et al.  An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy , 2018, PloS one.

[71]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[72]  Deebak Bakkiam David Analyzing Traffic Models Using IP Multimedia Server–Client Systems for Consumer Wireless Multimedia System Devices , 2018 .

[73]  Qi Li,et al.  D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption , 2018, IEEE Access.

[74]  Fadi Al-Turjman,et al.  Seamless secure anonymous authentication for cloud-based mobile edge computing , 2020, Comput. Electr. Eng..

[75]  Lein Harn,et al.  Group Authentication , 2013, IEEE Transactions on Computers.

[76]  Dariush Abbasinezhad-Mood,et al.  Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..

[77]  Mohsen Guizani,et al.  5G D2D Networks: Techniques, Challenges, and Future Prospects , 2018, IEEE Systems Journal.