An Efficient Mutual Authentication Scheme for Internet of Things

Abstract The Internet of Things (IoT) is developed to facilitate the connections and data sharing among people, devices, and systems. Among the infrastructural IoT techniques, Radio Frequency IDentification (RFID) has been used to enable the proliferation and communication in IoT networks. However, the RFID techniques usually suffer from security issues due to the inherent weaknesses of underlying wireless radio communications. One of the main security issues is the authentication vulnerability from the jamming attack. In order to tackle the vulnerabilities of key updating algorithms, this paper therefore proposes an efficient authentication scheme based on the self-adaptive and mutual key updating. Furthermore, we evaluate the performance and applicability of our solution with a thorough simulation by taking into account the energy consumption, authentication failure rate and authentication delay. The feasibility and applicability are demonstrated by implementing the proposed authentication scheme in smart home IoT systems.

[1]  Yutaka Ishibashi,et al.  An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework , 2017, Future Gener. Comput. Syst..

[2]  Christof Weinhardt,et al.  A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.

[3]  Ilsun You,et al.  A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks , 2019, IEEE Access.

[4]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[5]  Hongji Yang,et al.  Authentication and access control in RFID based logistics-customs clearance service platform , 2010, Int. J. Autom. Comput..

[6]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[7]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[8]  Ahmed Khattab,et al.  RFID Security Threats and Basic Solutions , 2017 .

[9]  Abdelshakour Abuzneid,et al.  Survey on Prominent RFID Authentication Protocols for Passive Tags , 2018, Sensors.

[10]  Wanlei Zhou,et al.  Detecting unauthorized RFID tag carrier for secure access control to a smart building , 2018 .

[11]  Kevin Bouchard,et al.  Exploiting Passive RFID Technology for Activity Recognition in Smart Homes , 2015, IEEE Intelligent Systems.

[12]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[13]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[14]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[15]  Mouzhi Ge,et al.  Exploring Big Data Clustering Algorithms for Internet of Things Applications , 2018, IoTBDS.

[16]  Andrei Gurtov,et al.  Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.

[17]  Xiang-Yang Li,et al.  One More Tag Enables Fine-Grained RFID Localization and Tracking , 2018, IEEE/ACM Transactions on Networking.

[18]  Sergio Takeo Kofuji,et al.  An effective intrusion detection approach for jamming attacks on RFID systems , 2015, 2015 International EURASIP Workshop on RFID Technology (EURFID).

[19]  Huifang Deng,et al.  Identity Authentication in RFID Based Logistics-Customs Clearance Service Platform , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[20]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[21]  Reiner Dojen,et al.  Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications , 2011, Comput. Electr. Eng..

[22]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[23]  Mostafa Azizi,et al.  Classification of major security attacks against RFID systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).

[24]  Yuan-Ting Zhang,et al.  A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.

[25]  Jong Hyuk Park,et al.  SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home , 2017 .

[26]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[27]  Maurizio Giacobbe,et al.  An IoT service ecosystem for Smart Cities: The #SmartME project , 2019, Internet Things.

[28]  Srinivas Sampalli,et al.  Technique for preventing DoS attacks on RFID systems , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.

[29]  Atul Prakash,et al.  Security Implications of Permission Models in Smart-Home Application Frameworks , 2017, IEEE Security & Privacy.

[30]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[31]  Biplab Sikdar,et al.  Low Power Data Integrity in IoT Systems , 2018, IEEE Internet of Things Journal.

[32]  Muhammad Asadullah,et al.  An overview of home automation systems , 2016, 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI).

[33]  Jemal H. Abawajy,et al.  Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag , 2013, Int. J. Networked Distributed Comput..

[34]  Mouzhi Ge,et al.  Self-adaptive RFID Authentication for Internet of Things , 2019, AINA.

[35]  Panagiotis G. Sarigiannidis,et al.  Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.

[36]  Mouzhi Ge,et al.  Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..

[37]  B. B. Gupta,et al.  Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.

[38]  Jian Su,et al.  SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system , 2018, Wirel. Networks.

[39]  Yunhao Liu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.

[40]  Willy Susilo,et al.  Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.

[41]  Saraju P. Mohanty,et al.  iTour: The Future of Smart Tourism: An IoT Framework for the Independent Mobility of Tourists in Smart Cities , 2018, IEEE Consumer Electronics Magazine.

[42]  Mauro Conti,et al.  SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT , 2019, Future Gener. Comput. Syst..

[43]  Baolong Liu,et al.  An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme , 2018, Inf..

[44]  Mohsen Machhout,et al.  Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag , 2018, Journal of Electronic Testing.

[45]  Ian T. Downard,et al.  Simulating Sensor Networks in NS-2 , 2004 .

[46]  Victor C. M. Leung,et al.  Energy Efficient Tag Identification Algorithms For RFID: Survey, Motivation And New Design , 2019, IEEE Wireless Communications.

[47]  In Lee,et al.  The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model , 2019, Internet Things.

[48]  Sajjan G. Shiva,et al.  IoMT-SAF: Internet of Medical Things Security Assessment Framework , 2019, Internet Things.

[49]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[50]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .