Smart City Gnosys

Smart city article details

Title A Lightweight Mutual And Transitive Authentication Mechanism For Iot Network
ID_Doc 2330
Authors Krishnasrija R.; Mandal A.K.; Cortesi A.
Year 2023
Published Ad Hoc Networks, 138
DOI http://dx.doi.org/10.1016/j.adhoc.2022.103003
Abstract IoT devices are typically authenticated directly by gateways present in the network. However, in large and complex IoT systems like the smart city or smart industry which consist of thousands of connected devices, it may not be always feasible to be directly connected to the gateway while it may be possible to be connected to another device. Therefore, already authenticated devices should facilitate the new device to get authenticated by the gateway. To address this issue, the existing protocols use multiple authentication protocols based on different cryptography techniques, which are difficult to implement and manage in resource constrained IoT devices. In this paper, we propose a Transitive device authentication protocol based on the Chebyshev polynomial. The transitive authentication protocol utilizes the session key established in the mutual authentication between the intermediate device and gateway. Both the mutual authentication and transitive authentication protocols are relying on the same preregistration and authentication mechanism. To ensure the security of the proposed authentication protocol, detailed security analysis is carried out, and the secure session key establishment is verified using the BAN logic. Moreover, the proposed protocol is tested against crucial attacks in the Scyther tool. These formal analyses and Scyther attack simulation show that the proposed protocol is capable of withstanding critical attacks. Finally, to verify the efficiency, the protocol implementation is experimentally compared with similar approaches studied in the literature. The results show that the proposed protocol offers better performance, providing significantly lower response time, handshake duration, memory utilization, and energy consumption. © 2022 Elsevier B.V.
Author Keywords BAN-logic; Device-to-device authentication; IoT authentication; Key agreement; Scyther


Similar Articles


Id Similarity Authors Title Published
2933 View0.871Li N.; Liu D.; Nepal S.; Pei G.A Needle In A Haystack: Finding A Suitable Lightweight Iot Authentication Protocol And Improving Its UsabilityProceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020 (2020)
2343 View0.865Saqib M.; Jasra B.; Moon A.H.A Lightweight Three Factor Authentication Framework For Iot Based Critical ApplicationsJournal of King Saud University - Computer and Information Sciences, 34, 9 (2022)
35256 View0.854Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
47662 View0.853Prakash M.; Ramesh K.Secure Multimodal Biometric Authentication Framework With Perceptual Hashing And Lightweight CryptographyJournal of Electronic Imaging, 33, 5 (2024)
4504 View0.851Haodudin Nurkifli E.; Hwang T.A Secure Lightweight Authentication Scheme In Iot Environment With Perfect Forward And Backward SecrecyIWBIS 2022 - 7th International Workshop on Big Data and Information Security, Proceedings (2022)
12683 View0.851Singh R.; Sturley S.; Tewari H.Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication For Secure Communication In An Internet Of Things NetworkFuture Internet, 15, 3 (2023)