Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. On...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2023-01-01
|
Series: | IET Networks |
Subjects: | |
Online Access: | https://doi.org/10.1049/ntw2.12054 |
_version_ | 1797953531907407872 |
---|---|
author | Selvakumar Manickam Shafiq Ul Rehman |
author_facet | Selvakumar Manickam Shafiq Ul Rehman |
author_sort | Selvakumar Manickam |
collection | DOAJ |
description | Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. One of the big issues in securing IoT communications is that traditional cryptographical protocols incur high computational costs and are not suitable for resource‐constrained devices. In this paper, the authors focus on issues related to secret keys distribution and authentication schemes. Although there exist some lightweight authentication schemes for IoT devices in the literature, they come with some limitations (e.g. preconfiguration of shared secret keys). A new lightweight authentication scheme suitable for IoT devices is proposed. This scheme incurs low resource utilisation and provides a trusted mode of Secret key distribution between IoT devices and a control server. A real‐time test‐bed environment is deployed to examine whether the authors’ proposed scheme is applicable for resource‐constrained devices. The authors’ performance analysis shows that the proposed scheme is efficient and is resistant to possible security attacks such as replay attacks, man‐in‐the middle attacks, impersonation attacks, modification attacks, and remote access trojan attacks. |
first_indexed | 2024-04-10T23:04:39Z |
format | Article |
id | doaj.art-7b7abd713941436c800028010307b83b |
institution | Directory Open Access Journal |
issn | 2047-4954 2047-4962 |
language | English |
last_indexed | 2024-04-10T23:04:39Z |
publishDate | 2023-01-01 |
publisher | Wiley |
record_format | Article |
series | IET Networks |
spelling | doaj.art-7b7abd713941436c800028010307b83b2023-01-13T13:54:04ZengWileyIET Networks2047-49542047-49622023-01-011211810.1049/ntw2.12054Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devicesSelvakumar Manickam0Shafiq Ul Rehman1National Advanced IPv6 Center (NAv6) Universiti Sains Malaysia (USM) George Town Penang MalaysiaNational Advanced IPv6 Center (NAv6) Universiti Sains Malaysia (USM) George Town Penang MalaysiaAbstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. One of the big issues in securing IoT communications is that traditional cryptographical protocols incur high computational costs and are not suitable for resource‐constrained devices. In this paper, the authors focus on issues related to secret keys distribution and authentication schemes. Although there exist some lightweight authentication schemes for IoT devices in the literature, they come with some limitations (e.g. preconfiguration of shared secret keys). A new lightweight authentication scheme suitable for IoT devices is proposed. This scheme incurs low resource utilisation and provides a trusted mode of Secret key distribution between IoT devices and a control server. A real‐time test‐bed environment is deployed to examine whether the authors’ proposed scheme is applicable for resource‐constrained devices. The authors’ performance analysis shows that the proposed scheme is efficient and is resistant to possible security attacks such as replay attacks, man‐in‐the middle attacks, impersonation attacks, modification attacks, and remote access trojan attacks.https://doi.org/10.1049/ntw2.12054cyber threatInternet of thingsIoT securitylightweight authenticationSecret key distributiontrusted communication |
spellingShingle | Selvakumar Manickam Shafiq Ul Rehman Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices IET Networks cyber threat Internet of things IoT security lightweight authentication Secret key distribution trusted communication |
title | Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices |
title_full | Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices |
title_fullStr | Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices |
title_full_unstemmed | Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices |
title_short | Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices |
title_sort | secured kds secret key distribution and authentication scheme for resource constrained devices |
topic | cyber threat Internet of things IoT security lightweight authentication Secret key distribution trusted communication |
url | https://doi.org/10.1049/ntw2.12054 |
work_keys_str_mv | AT selvakumarmanickam securedkdssecretkeydistributionandauthenticationschemeforresourceconstraineddevices AT shafiqulrehman securedkdssecretkeydistributionandauthenticationschemeforresourceconstraineddevices |