Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

The Internet of Things (IoT) is becoming an attractive system paradigm to realize interconnections through the physical, cyber, and social spaces. During the interactions among the ubiquitous things, security issues become noteworthy, and it is significant to establish enhanced solutions for security protection. In this work, we focus on an existing U2IoT architecture (i.e., unit IoT and ubiquitous IoT), to design an aggregated-proof based hierarchical authentication scheme (APHA) for the layered networks. Concretely, 1) the aggregated-proofs are established for multiple targets to achieve backward and forward anonymous data transmission; 2) the directed path descriptors, homomorphism functions, and Chebyshev chaotic maps are jointly applied for mutual authentication; 3) different access authorities are assigned to achieve hierarchical access control. Meanwhile, the BAN logic formal analysis is performed to prove that the proposed APHA has no obvious security defects, and it is potentially available for the U2IoT architecture and other IoT applications.

[1]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[2]  Wu Qi,et al.  Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[3]  Kai-Di Chang,et al.  Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs , 2012, KSII Trans. Internet Inf. Syst..

[4]  T. J. Rivlin The Chebyshev polynomials , 1974 .

[5]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[6]  Zhu Wang,et al.  From the internet of things to embedded intelligence , 2013, World Wide Web.

[7]  Jiming Chen,et al.  Smart community: an internet of things application , 2011, IEEE Communications Magazine.

[8]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[9]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[10]  Jingcheng Wang,et al.  A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.

[11]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[12]  Spyros G. Denazis,et al.  Identity management directions in future internet , 2011, IEEE Communications Magazine.

[13]  Qiaoyan Wen,et al.  Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology , 2011, CSISE.

[14]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[15]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[16]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[17]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[18]  Xingming Sun,et al.  An Anonymity and Authentication Mechanism for Internet of Things , 2011 .

[19]  Liang Chen,et al.  Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain , 2012, CyberC.

[20]  Óscar García-Morchón,et al.  HIP Security Architecture for the IP-Based Internet of Things , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[21]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[22]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[23]  Ren Fang,et al.  Attribute-Based Access Control Mechanism for Perceptive Layer of the Internet of Things , 2011 .

[24]  Guy Pujolle,et al.  HAT: HIP Address Translation protocol for Hybrid RFID/IP Internet of Things communication , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.

[25]  Xiaojiang Du,et al.  A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.

[26]  Gerhard P. Hancke,et al.  Security Challenges for User-Oriented RFID Applications within the "Internet of Things" , 2010 .

[27]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[28]  J. Dicapua Chebyshev Polynomials , 2019, Fibonacci and Lucas Numbers With Applications.

[29]  Huansheng Ning,et al.  Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.