| Literature DB >> 31847431 |
Mohammad Wazid1, Ashok Kumar Das2, Sachin Shetty3, Joel J P C Rodrigues4,5, Youngho Park6.
Abstract
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used "Automated Validation of Internet Security Protocols and Applications (AVISPA)" tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT.Entities:
Keywords: AVISPA; Internet of Things (IoT); NS2 simulation; authentication; edge computing; key management; security
Year: 2019 PMID: 31847431 PMCID: PMC6961035 DOI: 10.3390/s19245539
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Network model of the edge based IoT environment.
Notations used in the lightweight authenticated key management mechanism for the edge-based IoT environment (LDAKM-EIoT).
| Symbol | Meaning |
|---|---|
| Edge node and its identity, respectively | |
| Trusted authority and its identity, respectively | |
| Pseudo identities of | |
|
| Temporary identity of |
|
| 1024 bit shared secret key of the IoT device and edge node generated by |
|
| 1024 bit shared secret key of the edge node and cloud server generated by |
|
| 160 bit secret secret of |
|
| Registration timestamp of |
|
| Number of IoT devices and cloud servers deployed initially, respectively |
| 128 bit random numbers of | |
|
| Current timestamps generated by different entities |
|
| “Maximum transmission delay” associated with a message |
|
| “Collision resistant cryptographic one way hash function” |
|
| Session key between |
| Concatenation and bitwise |
Figure 2Credentials stored in , , and during registration processes.
Figure 3Abridging of the authentication and key agreement phase.
Figure 4Analysis of simulation results under the CL-AtSe and OFMC backends.
Communication costs’ comparison. LDAKM-EIoT, the lightweight authentication and key management scheme for the edge based IoT environment.
| Protocol | No. of Messages | No. of Bits |
|---|---|---|
| LDAKM-EIoT | 4 | 2400 |
| Challa et al. [ | 3 | 2528 |
| Farash et al. [ | 4 | 2752 |
| Sharma and Kalra [ | 4 | 2912 |
| Zhou et al. [ | 4 | 3840 |
| Turkanovic et al. [ | 4 | 2720 |
Comparison of computation costs.
| Scheme | User/Smart | Gateway Node/ | Sensing Device | Total Cost |
|---|---|---|---|---|
| IoT Device | Edge Node | /Cloud Server | ||
| LDAKM-EIoT |
|
|
|
|
| Challa et al. [ |
|
|
|
|
|
| ||||
| Farash et al. [ |
|
|
|
|
| Sharma and Kalra [ |
|
|
|
|
| Zhou et al. [ |
|
|
|
|
| Turkanovic et al. [ |
|
|
|
|
Comparison of functionality and security features.
| Feature | Farash | Challa | Turkanovic | Sharma and | Zhou | LDAKM-EIoT |
|---|---|---|---|---|---|---|
| et al. [ | et al. [ | et al. [ | Kalra [ | et al. [ | ||
|
| × | ✓ | ✓ | × | ✓ | ✓ |
|
| × | ✓ | × | × | × | ✓ |
|
| × | ✓ | × | × | ✓ | ✓ |
|
| × | ✓ | × | × | ✓ | NA |
|
| ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
| × | ✓ | × | ✓ | × | NA |
|
| ✓ | ✓ | ✓ | ✓ | × | ✓ |
|
| ✓ | ✓ | ✓ | ✓ | × | ✓ |
|
| ✓ | ✓ | ✓ | ✓ | × | ✓ |
|
| ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
| ✓ | × | × | ✓ | ✓ | ✓ |
|
| ✓ | ✓ | ✓ | ✓ | NA | ✓ |
|
| ✓ | ✓ | ✓ | ✓ | × | NA |
|
| ✓ | × | ✓ | ✓ | NA | ✓ |
|
| NA | ✓ | × | × | × | NA |
|
| ✓ | ✓ | × | ✓ | ✓ | ✓ |
|
| × | ✓ | × | × | × | NA |
|
| × | ✓ | ✓ | × | × | ✓ |
Note: : the property to make the user or smart IoT device anonymous; : protection for privileged-insider attack; : protection for off-line password guessing attack; : protection for stolen smart card or mobile device attack; : protection for denial-of-service attack; : protection for user impersonation attack; : protection for replay attack; : protection for man-in-the middle attack; : achieves mutual authentication; : achieves session key agreement; : property to make messages untraceability; : protection for sensor node/sensor/smart IoT device physical capture attack; : presence of server independent password update phase; : protection for sensor node/sensing device/smart IoT device impersonation attack; : support biometric update phase; : provide formal security verification using the automated software verification tool; : presence of the smart card revocation phase; : protection for session-key security under the CK adversary model. ×: insecure against a “specific attack” or a “particular feature” is not there; ✓: secure against a “specific attack” or a “particular feature” is present; NA: not applicable.
Different parameters used in the simulation. AODV, ad hoc on-demand distance vector.
| Parameter | Description |
|---|---|
| Platform | Ubuntu 14.04 LTS |
| Tool used | NS2 2.35 |
| Number of gateway nodes/edge nodes | 1 |
| (whenever applicable) | |
| Number of users or IoT device | 9 |
| (whenever applicable) | |
| Number of sensors or cloud server | 10 |
| (whenever applicable) | |
| Simulation time | 1800 s |
| Communication range of sensors/IoT devices | 100 m |
| Routing protocol | AODV [ |
Different messages exchanged among entities used in the simulation.
| Exchanged Messages between Network Entities | Challa | Farash | Turkanovic | Sharma | Zhou | LDAKM-EIoT |
|---|---|---|---|---|---|---|
| et al. [ | et al. [ | et al. [ | and Kalra [ | et al. [ | ||
|
| 992 bits | 512 bits | 672 bits | 672 bits | 800 bits | 512 bits |
| 1024 bits | 1024 bits | 1024 bits | 1024 bits | 1600 bits | 512 bits | |
| − | 672 bits | 576 bits | 672 bits | 960 bits | 512 bits | |
|
| − | 544 bits | 448 bits | 544 bits | 480 bits | 864 bits |
| 512 bits | − | − | − | − | − |
Figure 5Comparison of network parameters: (a) network throughput; (b) end-to-end delay.