Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber–Physical Systems

Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer their captured data from source towards the destination. Our evaluation results demonstrate that Hash- MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics.

[1]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[2]  Frank Y. Shih,et al.  A Robust Image Watermarking System Based on Deep Neural Networks , 2019, ArXiv.

[3]  Rahim Khan,et al.  Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS , 2021, IEEE Transactions on Industrial Informatics.

[4]  Yuan Wang,et al.  Wireless Monitoring System for Corrosion Degree of Reinforcement in Concrete , 2019 .

[5]  Thar Baker,et al.  The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey , 2019, Sensors.

[6]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[7]  Lixia Zhang,et al.  Distributed Dataset Synchronization in Disruptive Networks , 2019, 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[8]  Hao Liang,et al.  An ensemble bat algorithm for large-scale optimization , 2019, International Journal of Machine Learning and Cybernetics.

[9]  Kemal Akkaya,et al.  Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems , 2018, Future Gener. Comput. Syst..

[10]  Biplab Sikdar,et al.  Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices , 2019, IEEE Internet of Things Journal.

[11]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[12]  Thar Baker,et al.  A secure fog‐based platform for SCADA‐based IoT critical infrastructure , 2020, Softw. Pract. Exp..

[13]  Byung-Seo Kim,et al.  CCIC-WSN: An Architecture for Single-Channel Cluster-Based Information-Centric Wireless Sensor Networks , 2020, IEEE Internet of Things Journal.

[14]  Jinjun Chen,et al.  Detection of Malicious Code Variants Based on Deep Learning , 2018, IEEE Transactions on Industrial Informatics.

[15]  Ying Zhao,et al.  EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts , 2018, IEEE Internet of Things Journal.

[16]  Spyridon Mastorakis,et al.  Next-Generation Networking and Edge Computing for Mixed Reality Real-Time Interactive Systems , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).

[17]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[18]  Ahmed Ahmim,et al.  Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[19]  Kim-Kwang Raymond Choo,et al.  IoTChain: A Three-Tier Blockchain-based IoT Security Architecture , 2018, ArXiv.

[20]  Ujjwal Guin,et al.  A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications , 2020, Cryptogr..

[21]  Moayad Aloqaily,et al.  A Blockchain Framework for Securing Connected and Autonomous Vehicles , 2019, Sensors.

[22]  Lixia Zhang,et al.  DAPES: Named Data for Off-the-Grid File Sharing with Peer-to-Peer Interactions , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).

[23]  Alhuseen Omar Alsayed,et al.  An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks , 2020, Sensors.

[24]  Xiang-Chuan Gao,et al.  Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions , 2021, J. Netw. Comput. Appl..

[25]  Satyajayant Misra,et al.  ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.

[26]  Dengguo Feng,et al.  AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS , 2018, Comput. Networks.

[27]  Byung-Seo Kim,et al.  ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks , 2020, Future Gener. Comput. Syst..

[28]  Thar Baker,et al.  A decentralized lightweight blockchain-based authentication mechanism for IoT systems , 2020, Cluster Computing.

[29]  Ateeq Ur Rehman,et al.  A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing , 2021, IEEE Transactions on Industrial Informatics.

[30]  Yaser Jararweh,et al.  Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments , 2019, IEEE Communications Magazine.

[31]  Xiangliang Zhang,et al.  CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[32]  Elisa Bertino,et al.  Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications , 2017, IEEE Access.