Continuous Entity Authentication in the Internet of Things Scenario
In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation attacks for One-Message Unilateral Entity Authentica...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-05-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/13/10/5945 |
_version_ | 1797601260257411072 |
---|---|
author | Alfredo De Santis Anna Lisa Ferrara Manuela Flores Barbara Masucci |
author_facet | Alfredo De Santis Anna Lisa Ferrara Manuela Flores Barbara Masucci |
author_sort | Alfredo De Santis |
collection | DOAJ |
description | In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation attacks for One-Message Unilateral Entity Authentication (OM-UEA) schemes, in which the prover continuously authenticates itself through the use of a sequence of authentication messages. Given the limited computing power of the parties (particularly the prover) and the often limited bandwidth channel, in the IoT scenario it is desirable to design unilateral entity authentication schemes that require the use of a single message per session and light computations. In this paper, we first show that OM-UEA schemes can be implemented through digital signatures and that a weak form of unforgeability is sufficient to achieve security against active adversaries. We then apply the signature scheme proposed by Yang et al. in ASIACCS 2020 to our framework, resulting in an OM-UEA scheme that requires minimal computational effort and low storage requirements for the prover. Inspired by this last construction, we propose an OM-UEA scheme based on the hardness of the discrete logarithm problem, which further improves the computational performance for the prover. Our findings offer feasible options for implementing secure continuous entity authentication in IoT applications. |
first_indexed | 2024-03-11T03:58:38Z |
format | Article |
id | doaj.art-6a900b4d342943949aed0db7eac3c458 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-11T03:58:38Z |
publishDate | 2023-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-6a900b4d342943949aed0db7eac3c4582023-11-18T00:18:09ZengMDPI AGApplied Sciences2076-34172023-05-011310594510.3390/app13105945Continuous Entity Authentication in the Internet of Things ScenarioAlfredo De Santis0Anna Lisa Ferrara1Manuela Flores2Barbara Masucci3Department of Computer Science, University of Salerno, 84084 Fisciano, ItalyDepartment of Biosciences, Division of Computer Science, University of Molise, 86100 Campobasso, ItalyDepartment of Computer Science, University of Salerno, 84084 Fisciano, ItalyDepartment of Computer Science, University of Salerno, 84084 Fisciano, ItalyIn the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has led to the need for the constant entity verification of devices. Recently, a formal framework has been proposed to study resistance to impersonation attacks for One-Message Unilateral Entity Authentication (OM-UEA) schemes, in which the prover continuously authenticates itself through the use of a sequence of authentication messages. Given the limited computing power of the parties (particularly the prover) and the often limited bandwidth channel, in the IoT scenario it is desirable to design unilateral entity authentication schemes that require the use of a single message per session and light computations. In this paper, we first show that OM-UEA schemes can be implemented through digital signatures and that a weak form of unforgeability is sufficient to achieve security against active adversaries. We then apply the signature scheme proposed by Yang et al. in ASIACCS 2020 to our framework, resulting in an OM-UEA scheme that requires minimal computational effort and low storage requirements for the prover. Inspired by this last construction, we propose an OM-UEA scheme based on the hardness of the discrete logarithm problem, which further improves the computational performance for the prover. Our findings offer feasible options for implementing secure continuous entity authentication in IoT applications.https://www.mdpi.com/2076-3417/13/10/5945authentication schemesone-message unilateral entity authenticationcontinuous entity authentication |
spellingShingle | Alfredo De Santis Anna Lisa Ferrara Manuela Flores Barbara Masucci Continuous Entity Authentication in the Internet of Things Scenario Applied Sciences authentication schemes one-message unilateral entity authentication continuous entity authentication |
title | Continuous Entity Authentication in the Internet of Things Scenario |
title_full | Continuous Entity Authentication in the Internet of Things Scenario |
title_fullStr | Continuous Entity Authentication in the Internet of Things Scenario |
title_full_unstemmed | Continuous Entity Authentication in the Internet of Things Scenario |
title_short | Continuous Entity Authentication in the Internet of Things Scenario |
title_sort | continuous entity authentication in the internet of things scenario |
topic | authentication schemes one-message unilateral entity authentication continuous entity authentication |
url | https://www.mdpi.com/2076-3417/13/10/5945 |
work_keys_str_mv | AT alfredodesantis continuousentityauthenticationintheinternetofthingsscenario AT annalisaferrara continuousentityauthenticationintheinternetofthingsscenario AT manuelaflores continuousentityauthenticationintheinternetofthingsscenario AT barbaramasucci continuousentityauthenticationintheinternetofthingsscenario |