Continuous Entity Authentication in the Internet of Things Scenario

In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation attacks for One-Message Unilateral Entity Authentica...

Full description

Bibliographic Details
Main Authors: Alfredo De Santis, Anna Lisa Ferrara, Manuela Flores, Barbara Masucci
Format: Article
Language:English
Published: MDPI AG 2023-05-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/10/5945
_version_ 1797601260257411072
author Alfredo De Santis
Anna Lisa Ferrara
Manuela Flores
Barbara Masucci
author_facet Alfredo De Santis
Anna Lisa Ferrara
Manuela Flores
Barbara Masucci
author_sort Alfredo De Santis
collection DOAJ
description In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation attacks for One-Message Unilateral Entity Authentication (OM-UEA) schemes, in which the prover continuously authenticates itself through the use of a sequence of authentication messages. Given the limited computing power of the parties (particularly the prover) and the often limited bandwidth channel, in the IoT scenario it is desirable to design unilateral entity authentication schemes that require the use of a single message per session and light computations. In this paper, we first show that OM-UEA schemes can be implemented through digital signatures and that a weak form of unforgeability is sufficient to achieve security against active adversaries. We then apply the signature scheme proposed by Yang et al. in ASIACCS 2020 to our framework, resulting in an OM-UEA scheme that requires minimal computational effort and low storage requirements for the prover. Inspired by this last construction, we propose an OM-UEA scheme based on the hardness of the discrete logarithm problem, which further improves the computational performance for the prover. Our findings offer feasible options for implementing secure continuous entity authentication in IoT applications.
first_indexed 2024-03-11T03:58:38Z
format Article
id doaj.art-6a900b4d342943949aed0db7eac3c458
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T03:58:38Z
publishDate 2023-05-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-6a900b4d342943949aed0db7eac3c4582023-11-18T00:18:09ZengMDPI AGApplied Sciences2076-34172023-05-011310594510.3390/app13105945Continuous Entity Authentication in the Internet of Things ScenarioAlfredo De Santis0Anna Lisa Ferrara1Manuela Flores2Barbara Masucci3Department of Computer Science, University of Salerno, 84084 Fisciano, ItalyDepartment of Biosciences, Division of Computer Science, University of Molise, 86100 Campobasso, ItalyDepartment of Computer Science, University of Salerno, 84084 Fisciano, ItalyDepartment of Computer Science, University of Salerno, 84084 Fisciano, ItalyIn the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation attacks for One-Message Unilateral Entity Authentication (OM-UEA) schemes, in which the prover continuously authenticates itself through the use of a sequence of authentication messages. Given the limited computing power of the parties (particularly the prover) and the often limited bandwidth channel, in the IoT scenario it is desirable to design unilateral entity authentication schemes that require the use of a single message per session and light computations. In this paper, we first show that OM-UEA schemes can be implemented through digital signatures and that a weak form of unforgeability is sufficient to achieve security against active adversaries. We then apply the signature scheme proposed by Yang et al. in ASIACCS 2020 to our framework, resulting in an OM-UEA scheme that requires minimal computational effort and low storage requirements for the prover. Inspired by this last construction, we propose an OM-UEA scheme based on the hardness of the discrete logarithm problem, which further improves the computational performance for the prover. Our findings offer feasible options for implementing secure continuous entity authentication in IoT applications.https://www.mdpi.com/2076-3417/13/10/5945authentication schemesone-message unilateral entity authenticationcontinuous entity authentication
spellingShingle Alfredo De Santis
Anna Lisa Ferrara
Manuela Flores
Barbara Masucci
Continuous Entity Authentication in the Internet of Things Scenario
Applied Sciences
authentication schemes
one-message unilateral entity authentication
continuous entity authentication
title Continuous Entity Authentication in the Internet of Things Scenario
title_full Continuous Entity Authentication in the Internet of Things Scenario
title_fullStr Continuous Entity Authentication in the Internet of Things Scenario
title_full_unstemmed Continuous Entity Authentication in the Internet of Things Scenario
title_short Continuous Entity Authentication in the Internet of Things Scenario
title_sort continuous entity authentication in the internet of things scenario
topic authentication schemes
one-message unilateral entity authentication
continuous entity authentication
url https://www.mdpi.com/2076-3417/13/10/5945
work_keys_str_mv AT alfredodesantis continuousentityauthenticationintheinternetofthingsscenario
AT annalisaferrara continuousentityauthenticationintheinternetofthingsscenario
AT manuelaflores continuousentityauthenticationintheinternetofthingsscenario
AT barbaramasucci continuousentityauthenticationintheinternetofthingsscenario