Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities

Abstract The deployment of smart technologies such as smart meters, smart phones, and smart chips has facilitated the development of smart cities. Smart cities include different smart systems such as smart homes, smart grids, etc. These smart systems should be connected together along with huge number of smart objects in the world largest network known as the Internet of Things (IoT). Trusted communication between an IoT object, which could be any device, and smart systems is an essential objective for the security over the IoT. This can be supported by authentication enforcers which, with the large number of connected objects in the IoT, should impose efficient and scalable mobile object authentication solutions. In this paper, a four-layer architecture for mobile object authentication in the context of IoT smart cities is proposed. This architecture is designed to address different IoT challenges such as scalability, mobility, and heterogeneity. Moreover, the architecture is supported by the applicability of a proposed hierarchical elliptic curve identity based signature authentication protocol. The proposed architecture and the proposed authentication protocol have been compared with other related works proposed in the literature. Various design goals of IoT in smart cities have been considered in the comparison along with the computation cost on both the sender and the receiver entities. Results show that the proposed architecture supports more design goals of IoT in smart city than its rival architectures and the proposed authentication protocol has lower computation cost than the other related protocols.

[1]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[2]  Sk Hafizul Islam,et al.  An efficient and provably - secure digital signature scheme based on elliptic curve bilinear pairings , 2012 .

[3]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[4]  Levente Buttyán,et al.  A simple logic for authentication protocol design , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[5]  P. Ray Home Health Hub Internet of Things (H3IoT): An architectural framework for monitoring health of elderly people , 2014, 2014 International Conference on Science Engineering and Management Research (ICSEMR).

[6]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[7]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[8]  Sherali Zeadally,et al.  Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.

[9]  B. B. Zaidan,et al.  A review of smart home applications based on Internet of Things , 2017, J. Netw. Comput. Appl..

[10]  Flauzac Olivier,et al.  New Security Architecture for IoT Network , 2015, ANT/SEIT.

[11]  Md. Iftekhar Hussain,et al.  Internet of Things: challenges and research opportunities , 2017, CSI Transactions on ICT.

[12]  Giancarlo Fortino,et al.  Enabling IoT interoperability through opportunistic smartphone-based mobile gateways , 2017, J. Netw. Comput. Appl..

[13]  Kim-Kwang Raymond Choo,et al.  Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Panwit Tuwanut,et al.  A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).

[15]  Feng Luo,et al.  The architecture and key technologies of Internet of Things in logistics , 2013 .

[16]  Tarik Taleb,et al.  M2M-based metropolitan platform for IMS-enabled road traffic management in IoT , 2011, IEEE Communications Magazine.

[17]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[18]  Reza Curtmola,et al.  Fostering participaction in smart cities: a geo-social crowdsensing platform , 2013, IEEE Communications Magazine.

[19]  Yao Li,et al.  Construction and Strategies in IoT Security System , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[20]  Sk Hafizul Islam,et al.  A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication , 2017, J. King Saud Univ. Comput. Inf. Sci..

[21]  Wesam Almobaideen,et al.  Internet of Things: Geographical Routing based on healthcare centers vicinity for mobile smart tourism destination , 2017 .

[22]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[23]  Ling Zheng,et al.  Research of Architecture and Application of Internet of Things for Smart Grid , 2012, 2012 International Conference on Computer Science and Service System.

[24]  Jan Wessels APPLICATIONS OF BAN-LOGIC , 2001 .

[25]  Partha Pratim Ray Towards an Internet of Things based architectural framework for defence , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[26]  Marília Curado,et al.  A resilient Internet of Things architecture for smart cities , 2017, Ann. des Télécommunications.

[27]  Liang Yan,et al.  Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.

[28]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[29]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[30]  Wade Trappe,et al.  A Security Framework for the Internet of Things in the Future Internet Architecture , 2017, Future Internet.

[31]  G. P. Biswas,et al.  A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks , 2012, Ann. des Télécommunications.

[32]  Luka Milic,et al.  A novel versatile architecture for Internet of Things , 2015, 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[33]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[34]  Azzam Sleit,et al.  Authentication Techniques for the Internet of Things: A Survey , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).

[35]  Richard A. Frost,et al.  A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.

[36]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[37]  Partha Pratim Ray A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..

[38]  Chien-Hua Tsai,et al.  An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents , 2017, Secur. Commun. Networks.

[39]  Minghui Zhang,et al.  Architecture of Internet of Things and Its Key Technology Integration Based-On RFID , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.

[40]  Carles Pous,et al.  A novel communication system approach for a Smart City based on the human nervous system , 2017, Future Gener. Comput. Syst..

[41]  Theodore Tryfonas,et al.  A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things , 2014, IEEE Transactions on Industrial Informatics.

[42]  Michael Weyrich,et al.  Reference Architectures for the Internet of Things , 2016, IEEE Software.

[43]  Khair Eddin Sabri,et al.  Internet of Things: A review to support IoT architecture's design , 2017, 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS).

[44]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[45]  Wesam Almobaideen,et al.  Geographical Route Selection Based on User Public Transportation and Service Preferences , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[46]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.