Smart City Gnosys

Smart city article details

Title A Needle In A Haystack: Finding A Suitable Lightweight Iot Authentication Protocol And Improving Its Usability
ID_Doc 2933
Authors Li N.; Liu D.; Nepal S.; Pei G.
Year 2020
Published Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020
DOI http://dx.doi.org/10.1109/TPS-ISA50397.2020.00017
Abstract Internet of Things (IoT) comprises of networked computing devices that can sense and even actuate. It has been widely used in many applications such as smart cities, smart factories, supply chains, smart grid, and precision health. One of the key challenges in practice is to find a suitable lightweight authentication protocol with concerns of security, performance, compatibility, and usability for resource-constrained IoT devices. Due to the lack of security standards for such IoT devices, it is challenging to choose a suitable authentication protocol in practice. For example, many lightweight authentication protocols provide theoretical security analyses, but practical feasibility is not discussed. The integration between a new protocol and the existing standards is non-trivial. It is hence important to develop a novel paradigm for comparing and selecting lightweight authentication protocols considering both theoretical and practical factors. In this paper, we first show the importance and challenges of finding suitable lightweight authentication protocols. Then, we demonstrate how such a paradigm can be built with DTLS, describing a methodology of selecting a protocol and integrating with industry-standard libraries. In our demonstration, the protocol implementation is conducted not only on resource-constrained devices but also based on OpenSSL libraries. The result shows the feasibility, though with difficulties, to integrate a strong security protocol with the existing standards. © 2020 IEEE.
Author Keywords Authentication; DTLS; Internet-of-Things (IoT); OpenSSL


Similar Articles


Id Similarity Authors Title Published
5129 View0.885Mohammad Z.; Abusukhon A.; Qattam T.A.A Survey Of Authenticated Key Agreement Protocols For Securing Iot2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings (2019)
35247 View0.882Ahmed W.K.; Mohammed R.S.Lightweight Authentication Methods In Iot: SurveyProceedings of the 2nd 2022 International Conference on Computer Science and Software Engineering, CSASE 2022 (2022)
32963 View0.88Dargaoui S.; Azrour M.; El Allaoui A.; Guezzaz A.; Alabdulatif A.; Alnajim A.Internet Of Things Authentication Protocols: Comparative StudyComputers, Materials and Continua, 79, 1 (2024)
35277 View0.877Joshi M.; Mazumdar B.; Dey S.Lightweight Security Protocols For Securing Iot Devices In Smart CitiesAdvanced Sciences and Technologies for Security Applications (2021)
2330 View0.871Krishnasrija R.; Mandal A.K.; Cortesi A.A Lightweight Mutual And Transitive Authentication Mechanism For Iot NetworkAd Hoc Networks, 138 (2023)
35256 View0.867Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
47601 View0.866Badar H.M.S.; Mahmood K.; Akram W.; Ghaffar Z.; Umar M.; Das A.K.Secure Authentication Protocol For Home Area Network In Smart Grid-Based Smart CitiesComputers and Electrical Engineering, 108 (2023)
47934 View0.865Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
35276 View0.861Saurabh; Sharma C.; Khan S.; Mahajan S.; Alsagri H.S.; Almjally A.; Alabduallah B.I.; Ansari A.A.Lightweight Security For IotJournal of Intelligent and Fuzzy Systems, 45, 4 (2023)
2343 View0.861Saqib M.; Jasra B.; Moon A.H.A Lightweight Three Factor Authentication Framework For Iot Based Critical ApplicationsJournal of King Saud University - Computer and Information Sciences, 34, 9 (2022)