| Literature DB >> 35062563 |
Mayuresh Sunil Pardeshi1,2, Ruey-Kai Sheu3, Shyan-Ming Yuan4.
Abstract
Authentication is essential for the prevention of various types of attacks in fog/edge computing. Therefore, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices' vulnerability, as there have been several years of growing concerns regarding their security. Therefore, a novel model is designed that is stronger and effective against any kind of unauthorized attack, as IoT devices' vulnerability is on the rise due to the mass production of IoT devices (embedded processors, camera, sensors, etc.), which ignore the basic security requirements (passwords, secure communication), making them vulnerable and easily accessible. Furthermore, crackable passwords indicate that the security measures taken are insufficient. As per the recent studies, several applications regarding its requirements are the IoT distributed denial of service attack (IDDOS), micro-cloud, secure university, Secure Industry 4.0, secure government, secure country, etc. The problem statement is formulated as the "design and implementation of dynamically interconnecting fog servers and edge devices using the mode-based hash chain for secure mutual authentication protocol", which is stated to be an NP-complete problem. The hash-chain fog/edge implementation using timestamps, mode-based hash chaining, the zero-knowledge proof property, a distributed database/blockchain, and cryptography techniques can be utilized to establish the connection of smart devices in large numbers securely. The hash-chain fog/edge uses blockchain for identity management only, which is used to store the public keys in distributed ledger form, and all these keys are immutable. In addition, it has no overhead and is highly secure as it performs fewer calculations and requires minimum infrastructure. Therefore, we designed the hash-chain fog/edge (HCFE) protocol, which provides a novel mutual authentication scheme for effective session key agreement (using ZKP properties) with secure protocol communications. The experiment outcomes proved that the hash-chain fog/edge is more efficient at interconnecting various devices and competed favorably in the benchmark comparison.Entities:
Keywords: Internet of Things (IoT); fog/edge security; mutual authentication; security; security protocol
Year: 2022 PMID: 35062563 PMCID: PMC8777787 DOI: 10.3390/s22020607
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison with the recent approaches.
| References | Mutual Authentication Scheme | Entity’s Involved in the Authentication Process | Cryptography (Enc/Dec) or Message Communication | Protocol Implementation Scenario |
|---|---|---|---|---|
| Vehicle-to-grid (V2G) [ | Physical unclonable function (PUF)-based secure user key exchange authentication (SUKA) | Vehicle, aggregator, and grid server | A function designed to perform XOR, addition, scalar multiplication, and exponential computation | A vehicle smart grid ecosystem (V2G) |
| Remote health monitoring [ | A signature-based two-factor authentication protocol | The body sensors, personal devices (PDs), the medical server (MS), and the user (doctor/family) | A function using a secret key, a prime number, a generator of the cyclic group, a pseudo-random value, a hash function, an XOR operation, a concatenation operation, and nonce values | Remote health monitoring |
| 5G security [ | A signature-based mutual authentication protocol for m-health systems, which supports D2D communication within the 3GPP infrastructure | A health center, a cloud server, patients with and without sensors, patients’ devices, doctors, 3GPP access technology, evolved node B (eNB), and the 3GPP evolved packet core (EPC), represented by the home subscriber server (HSS) | Symmetric key with a random number, bi-linear pairing, and a signature | Mobile health (m-health) and telecare medicine information systems (TMISs) |
| Public key infrastructure (PKI)-IoT [ | Enhanced elliptic-curve-cryptography (ECC)-based two-factor authentication framework | A user/smart card and server | Elliptic curve discrete logarithms problem (ECDLP) and elliptic curve computational Diffie–Hellman problem (ECCDHP) | Smart card authentication |
| Hash-chain fog/edge | A novel mode-based hash-chain mutual authentication protocol | A cloud server, a university gateway server, a department server, and a user/device | Symmetric key with the lightweight encryption system (LES) | A fog/edge model for inter-university student authentication |
Figure 1Fog/edge architecture for the university scenario.
Figure 2System model for the hash-chain fog/edge protocol.
Figure 3Challenge model. (a) Balanced tree with a superfluous sub-branch having 4 × 4 nodes. (b) Directed graph transition matrix in each node. (c) Hash-chain flow.
Experimental setup.
| System Environment | Server, Workstation | AWS Cloud | Raspberry Pi (3B+) |
|---|---|---|---|
| System Hardware | Intel Core i5 @ 3.10 GHz | T2.micro @ 2.5 GHz | Arm v8 @ 1.4 GHz |
| Primary Memory | 16 GB | 1 GiB | 1 GB SDRAM |
| Operating System | Ubuntu 16.04 | Amazon Linux 2 AMI | Ubuntu Server 19 |
Libraries used in the different systems.
| System | Library |
|---|---|
| AWS Cloud/Workstation (Server) | Random, hashlib, datetime and numpy. |
| Raspberry Pi | Random, hashlib, datetime, socket and JSON. |
| Contiki Cooja Simulator | <stdio.h>, <stdlib.h>, <string.h>, “contiki.h”, “net/rime.h”, “lib/list.h”, “lib/memb.h”, “dev/button-sensor.h” and “dev/leds.h”. |
Session key performance analysis.
| Session Key | Generation Time in s (100 Keys Each) |
|---|---|
|
| 0.0080812 |
|
| 0.00739694 |
| Updated | 0.00851083 |
Figure 4Time generation analysis of session keys.
Figure 5Session key generation time on the workstation for (a) Session Key 1, (b) Session Key 2, and (c) Session Key 3, the AWS Cloud for (d) Session Key 1, (e) Session Key 2, and (f) Session Key 3, and the Raspberry Pi (g) Session Key 1, (h) Session Key 2, and (i) Session Key 3.
Figure 6Independent protocol performance time on the (a) workstation, (b) AWS Cloud, and (c) Raspberry Pi.
Figure 7Performance with respect to the hash-chain fog/edge protocol total time on the (a) workstation, (b) AWS Cloud, and (c) Raspberry Pi and (d) for message exchange with cryptography.
Figure 8Performance with respect to the hash-chain fog/edge protocol in (a) Mode 1 and (b) Mode 2 time on the workstation, AWS Cloud, and Raspberry Pi.
Comparison of protocol objectives.
| Features | [ | [ | [ | [ | [ | [ | [ | Hash-Chain |
|---|---|---|---|---|---|---|---|---|
| 1. Mutual Authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| 2. Session Key | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| 3. Zero-Knowledge Proofs | ✓ | |||||||
| 4. Cryptography (Enc/Dec) | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| 5. Message Integrity | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
| 6. Protocol Verification Logic | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||
| 7. Active Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| 8. Passive Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||
| 9. Advance Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| 10. Attack Severity Level’s | ✓ | ✓ |
5G AKA protocol comparison.
| Features | 5G-AKA | Hash-Chain |
|---|---|---|
| 1. Secret Key Sharing | Shared SN and HN Key | Not Shared |
| 2. Challenge–Response | Key Hash, Random Number, and Identity | Zero-Knowledge Proof |
| 3. Authentication Process (AP) | Hash Comparison and Key Seed | Mode-Based Tree and Graph Transition |
| 4. Key Sharing | Repetition | Unique |
| 5. Cryptography | No | Yes |
| 6. Entities Involved in AP | SN, HN and Subscriber | Target Device, AS |
| 7. Channel Attacks | Sensitive S-SN to MITM by Passive/Active Attacks | Uses Time-Based Hash-Chain |
| 8. Management of Key Database | Uses Roaming for HN Proxy Connectivity | Blockchain Distributed Ledger |
| 9. Structure of System Model | Hash Function and Key Exchange | Novel Hash-Chain |
Comparison of the computational cost to authenticate 1000 nodes.
| Protocols | Total Computational Cost | Time (s) |
|---|---|---|
| Amin et al.
[ | 26 | 8.32/6.72 |
| Luo et al.
[ | 26 | 8.32 |
| Kumari et al.
[ | 18 | 5.76 |
| Hash-Chain | 6 | 0.125 |
Comparison of standard benchmarks.
| Protocol | Completion Time (ms) |
|---|---|
| RSA | 23,500 |
| Hash-Chain Fog/Edge | 20,787 |
Ethernet comparison.
| System | Completion Time (s) |
|---|---|
| WS (server) to Pi (client) | 0.0023081 |
| Pi (server) to Pi (client) | 0.0073781 |