Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes

The Internet of Things (IoT) devices perform security-critical operations and deal with sensitive information in the IoT-based systems. Therefore, the increased deployment of smart devices will make them targets for cyber attacks. Adversaries can perform malicious actions, leak private information, and track devices' and their owners' location by gaining unauthorized access to IoT devices and networks. However, conventional security protocols are not primarily designed for resource constrained devices and therefore cannot be applied directly to IoT systems. In this paper, we propose Boot-IoT – a privacy-preserving, lightweight, and scalable security scheme for limited resource devices. Boot-IoT prevents a malicious device from joining an IoT network. Boot-IoT enables a device to compute a unique identity for authentication each time the device enters a network. Moreover, during device to device communication, Boot-IoT provides a lightweight mutual authentication scheme that ensures privacy-preserving identity usages. We present a detailed analysis of the security strength of BootIoT. We implemented a prototype of Boot-IoT on IoT devices powered by Contiki OS and provided an extensive comparative analysis of Boot-IoT with contemporary authentication methods. Our results show that Boot-IoT is resource efficient and provides better scalability compared to current solutions.

[1]  Alexis Olivereau,et al.  D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[2]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[3]  Antonio F. Gómez-Skarmeta,et al.  PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices , 2013, Sensors.

[4]  James Gross,et al.  In VANETs we trust?: characterizing RF jamming in vehicular networks , 2012, VANET@MOBICOM.

[5]  Óscar García-Morchón,et al.  Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.

[6]  Giuseppe Piro,et al.  Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.

[7]  Andrei V. Gurtov,et al.  Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[8]  Alexis Olivereau,et al.  HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things , 2012, Third International Conference on Communications and Networking.

[9]  Anthony Skjellum,et al.  Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[10]  Mario Gerla,et al.  Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[11]  Bo Xu,et al.  VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs , 2015, ICA3PP.

[12]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[13]  Antonio F. Gómez-Skarmeta,et al.  Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .

[14]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[15]  Rafael Marin-Lopez,et al.  Lightweight CoAP-Based Bootstrapping Service for the Internet of Things , 2016, Sensors.

[16]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[17]  Tai-hoon Kim,et al.  A Review on Security in Smart Home Development , 2010 .

[18]  Angelos D. Keromytis,et al.  From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television , 2014, USENIX Security Symposium.

[19]  Klaus Wehrle,et al.  Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[20]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.