A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

Kumar Sekhar Roy , Subhrajyoti Deb , Hemanta Kumar Kalita

›› 2024, Vol. 10 ›› Issue (4) : 989 -1000.

PDF
›› 2024, Vol. 10 ›› Issue (4) :989 -1000. DOI: 10.1016/j.dcan.2022.12.003
Research article
research-article

A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

Author information +
History +
PDF

Abstract

The Internet of Things (IoT) has taken the interconnected world by storm. Due to their immense applicability, IoT devices are being scaled at exponential proportions worldwide. But, very little focus has been given to securing such devices. As these devices are constrained in numerous aspects, it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all. We have seen distributed denial-of-service attacks being raised using such devices during the infamous Mirai botnet attack in 2016. Therefore we propose a lightweight authentication protocol to provide proper access to such devices. We have considered several aspects while designing our authentication protocol, such as scalability, movement, user registration, device registration, etc. To define the architecture we used a three-layered model consisting of cloud, fog, and edge devices. We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage. We also provide a fail-safe mechanism for a situation where an authenticating server might fail, and the deployed IoT devices can self-organize to keep providing services with no human intervention. We find that our protocol works the fastest when using ring learning with errors. We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool. In conclusion, we propose a safe, hybrid, and fast authentication protocol for authenticating IoT devices in a fog computing environment.

Keywords

Internet of things / Authentication / Post-quantum cryptography / Lattice-based cryptography / Cloud computing / Fog computing / Fail-safe

Cite this article

Download citation ▾
Kumar Sekhar Roy, Subhrajyoti Deb, Hemanta Kumar Kalita. A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks. , 2024, 10(4): 989-1000 DOI:10.1016/j.dcan.2022.12.003

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things characterization of fog computing, Proc. MCC, ACM (2016) 13-17.

[2]

M. Ajtai, Generating hard instances of lattice problems, in: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, ACM, 1996, pp. 99-108.

[3]

V. Lyubashevsky, C. Peikert, O. Regev, On ideal lattices and learning with errors over rings, in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2010, pp. 1-23.

[4]

C. Gentry, C. Peikert, V. Vaikuntanathan,Trapdoors for hard lattices and new cryptographic constructions, in:Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, 2008, pp. 197-206.

[5]

J. Hoffstein, J. Pipher, J.H. Silverman, Ntru: a ring-based public key cryptosystem,in: International Algorithmic Number Theory Symposium, Springer, 1998, pp. 267-288.

[6]

R.J. McEliece, A public-key cryptosystem based on algebraic, Coding Thv 4244 (1978) 114-116.

[7]

K.H. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authentication scheme for wireless sensor networks, in: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), vol. 1, IEEE, 2006, pp. 8-16.

[8]

K. Xue, P. Hong, C. Ma, A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture, J. Comput. Syst. Sci. 80 (1) (2014) 195-206.

[9]

B. Wang, M. Ma, A smart card based efficient and secured multi-server authentication scheme, Wireless Pers. Commun. 68 (2) (2013) 361-378.

[10]

M.-C. Chuang, M.C. Chen, An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics, Expert Syst. Appl. 41 (4) (2014) 1411-1418.

[11]

S.K. Sood, A.K. Sarje, K. Singh, A secure dynamic identity based authentication protocol for multi-server architecture, J. Netw. Comput. Appl. 34 (2) (2011) 609-618.

[12]

J.-J. Huang, W.-S. Juang, C.-I. Fan, Y.-F. Tseng, H. Kikuchi, Lightweight authentication scheme with dynamic group members in iot environments,in:Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016, pp. 88-93.

[13]

M.L. Das, Two-factor user authentication in wireless sensor networks, IEEE Trans. Wireless Commun. 8 (3) (2009) 1086-1090.

[14]

M.K. Khan, K. Alghathbar, Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks, Sensors 10 (3) (2010) 2450-2459.

[15]

M. Turkanović, B. Brumen, M. Hölbl, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion, Ad Hoc Netw. 20 (2014) 96-112.

[16]

S. Kalra, S.K. Sood, Secure authentication scheme for iot and cloud servers, Pervasive Mob. Comput. 24 (2015) 210-223.

[17]

P.K. Dhillon, S. Kalra, A secure multi-factor ecc based authentication scheme for cloud-iot based healthcare services, J. Ambient Intell. Smart Environ. 11 (2) (2019) 149-164.

[18]

A. Tewari, B. Gupta, A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices, Int. J. Adv. Intell. Paradigms 9 (2-3) (2017) 111-121.

[19]

A.A. Diro, N. Chilamkurti, N. Kumar, Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing, Mobile Network. Appl. 22 (5) (2017) 848-858.

[20]

Z. Liu, K.-K.R. Choo, J. Grossschadl, Securing edge devices in the post-quantum internet of things using lattice-based cryptography, IEEE Commun. Mag. 56 (2)(2018) 158-162.

[21]

T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, G. Carle, Dtls based security and two-way authentication for the internet of things, Ad Hoc Netw. 11 (8) (2013) 2710-2723.

[22]

R. Housley, W. Ford, W. Polk, D. Solo x. Internet, 509 public key infrastructure certificate and crl profile, Tech. rep., RFC 2459 (January) (1999).

[23]

R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21 (2) (1978) 120-126.

[24]

P.W. Shor, Algorithms for quantum computation: discrete logarithms and factoring,in:Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE, 1994, pp. 124-134.

[25]

M. Suárez-Albela, T.M. Fernández-Caramés, P. Fraga-Lamas, L. Castedo, A practical evaluation of a high-security energy-efficient gateway for iot fog computing applications, Sensors 17 (9) (2017) 1978.

[26]

N. Koblitz, Elliptic curve cryptosystems, Math. Comput. 48 (177) (1987) 203-209.

[27]

K.S. Roy, H.K. Kalita, A quantum safe user authentication protocol for the internet of things, Int. J.Next Generate. Comput. (2019) 178-192.

[28]

R. Xu, C. Cheng, Y. Qin,T. Jiang, Lighting the Way to a Smart World: Lattice-Based Cryptography for Internet of Things, arXiv preprint arXiv:1805.04880.

[29]

R. Chen, D. Peng, A novel ntru-based handover authentication scheme for wireless networks, IEEE Commun. Lett. 22 (3) (2017) 586-589.

[30]

K.S. Roy, H.K. Kalita, A survey on post-quantum cryptography for constrained devices, Int. J. Appl. Eng. Res. 14 (11) (2019) 2608-2615.

[31]

O.M. Guillen, T. Pöppelmann, J.M.B. Mera, E.F. Bongenaar, G. Sigl, J. Sepulveda,Towards post-quantum security for iot endpoints with ntru, in: Design, Automation & Test in Europe Conference & Exhibition (DATE) 2017, IEEE, 2017, pp. 698-703.

[32]

Z. Liu, T. Pöppelmann, T. Oder, H. Seo, S.S. Roy, T. Güneysu, J. Großschädl, H. Kim, I. Verbauwhede, High-performance ideal lattice-based cryptography on 8-bit avr microcontrollers, ACM Trans. Embed. Comput. Syst. 16 (4) (2017) 1-24.

[33]

J. Buchmann, F. Göpfert, T. Güneysu, T. Oder, T. Pöppelmann, High-performance and lightweight lattice-based public-key encryption, in: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016, pp. 2-9.

[34]

T. Güneysu, T. Oder, Towards lightweight identity-based encryption for the post-quantum-secure internet of things, in: 2017 18th International Symposium on Quality Electronic Design (ISQED), IEEE, 2017, pp. 319-324.

[35]

E. Alkim, P. Jakubeit, P. Schwabe, Newhope on arm cortex-m, in:International Conference on Security, Privacy, and Applied Cryptography Engineering, Springer, 2016, pp. 332-349.

[36]

A. Lohachab, et al., Using quantum key distribution and ecc for secure inter-device authentication and communication in iot infrastructure,in:Proceedings of 3rd International Conference on Internet of Things and Connected Technologies, ICIoTCT, 2018, pp. 26-27.

[37]

L. Chen, L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, D. Smith-Tone,Report on Post-quantum Cryptography, vol. 12, US Department of Commerce, National Institute of Standards and Technology, 2016.

[38]

D. Coppersmith, A. Shamir, Lattice attacks on ntru, in: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 1997, pp. 52-61.

[39]

N. Howgrave-Graham, A hybrid lattice-reduction and meet-in-the-middle attack against ntru, in: Annual International Cryptology Conference, Springer, 2007, pp. 150-169.

[40]

C. van Vredendaal, Reduced memory meet-in-the-middle attack against the ntru private key, LMS J. Comput. Math. 19 (A) (2016) 43-57.

[41]

D.J. Bernstein, C. Chuengsatiansup, T. Lange, C.v. Vredendaal, Ntru prime: reducing attack surface at low cost,in: International Conference on Selected Areas in Cryptography, Springer, 2017, pp. 235-260.

[42]

O. Regev, On lattices, learning with errors, random linear codes, and cryptography, J. ACM 56 (6) (2009) 1-40.

[43]

R. De Clercq, S.S. Roy, F. Vercauteren, I. Verbauwhede, Efficient software implementation of ring-lwe encryption, in: 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), IEEE, 2015, pp. 339-344.

[44]

M. Mukherjee, M. Guo, J. Lloret, R. Iqbal, Q. Zhang, Deadline-aware fair scheduling for offloaded tasks in fog computing with inter-fog dependency, IEEE Commun. Lett. 24 (2) (2019) 307-311.

[45]

R.A. Sadek, Hybrid energy aware clustered protocol for iot heterogeneous network, Future Compute Informatic J. 3 (2) (2018) 166-177.

[46]

S. Tyagi, N. Kumar, A systematic review on clustering and routing techniques based upon leach protocol for wireless sensor networks, J. Netw. Comput. Appl. 36 (2)(2013) 623-645.

[47]

C. Wieschebrink, Cryptanalysis of the niederreiter public key scheme based on grs subcodes, in: International Workshop on Post-Quantum Cryptography, Springer, 2010, pp. 61-72.

[48]

D. He, S. Wu, Security flaws in a smart card based authentication scheme for multi-server environment, Wireless Pers. Commun. 70 (1) (2013) 323-329.

[49]

V. Shivraj, M. Rajan, M. Singh, P. Balamuralidhar, One time password authentication scheme based on elliptic curves for internet of things (iot), in: 2015 5th National Symposium on Information Technology: towards New Smart World (NSITNSW), IEEE, 2015, pp. 1-6.

[50]

R. Amin, N. Kumar, G. Biswas, R. Iqbal, V. Chang, A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment, Future Generat. Comput. Syst. 78 (2018) 1005-1019.

[51]

J. Xu, W.-T. Zhu, D.-G. Feng, Improvement of a fingerprint-based remote user authentication scheme, in: 2008 International Conference on Information Security and Assurance (Isa 2008), IEEE, 2008, pp. 87-92.

[52]

E.-J. Yoon, K.-Y. Yoo, Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem, J. Supercomput. 63 (1) (2013) 235-255.

[53]

T. Shah, S. Venkatesan, Authentication of iot device and iot server using secure vaults, in: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), IEEE, 2018, pp. 819-824.

[54]

C. Schmitt, M. Noack, B. Stiller, Tinyto: two-way authentication for constrained devices in the internet of things,in: Internet of Things, Elsevier, 2016, pp. 239-258.

[55]

C.-T. Li, M.-S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, J. Netw. Comput. Appl. 33 (1) (2010) 1-5.

[56]

Smaragdakis, Georgios, Ibrahim Matta and Azer Bestavros. "SEP: A stable election protocol for clustered heterogeneous wireless sensor networks. " In Second international workshop on sensor and actor network protocols and applications (SANPA 2004), (3)(2004) 1-10

AI Summary AI Mindmap
PDF

98

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/