Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. On...

Full description

Bibliographic Details
Main Authors: Selvakumar Manickam, Shafiq Ul Rehman
Format: Article
Language:English
Published: Wiley 2023-01-01
Series:IET Networks
Subjects:
Online Access:https://doi.org/10.1049/ntw2.12054
_version_ 1797953531907407872
author Selvakumar Manickam
Shafiq Ul Rehman
author_facet Selvakumar Manickam
Shafiq Ul Rehman
author_sort Selvakumar Manickam
collection DOAJ
description Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. One of the big issues in securing IoT communications is that traditional cryptographical protocols incur high computational costs and are not suitable for resource‐constrained devices. In this paper, the authors focus on issues related to secret keys distribution and authentication schemes. Although there exist some lightweight authentication schemes for IoT devices in the literature, they come with some limitations (e.g. preconfiguration of shared secret keys). A new lightweight authentication scheme suitable for IoT devices is proposed. This scheme incurs low resource utilisation and provides a trusted mode of Secret key distribution between IoT devices and a control server. A real‐time test‐bed environment is deployed to examine whether the authors’ proposed scheme is applicable for resource‐constrained devices. The authors’ performance analysis shows that the proposed scheme is efficient and is resistant to possible security attacks such as replay attacks, man‐in‐the middle attacks, impersonation attacks, modification attacks, and remote access trojan attacks.
first_indexed 2024-04-10T23:04:39Z
format Article
id doaj.art-7b7abd713941436c800028010307b83b
institution Directory Open Access Journal
issn 2047-4954
2047-4962
language English
last_indexed 2024-04-10T23:04:39Z
publishDate 2023-01-01
publisher Wiley
record_format Article
series IET Networks
spelling doaj.art-7b7abd713941436c800028010307b83b2023-01-13T13:54:04ZengWileyIET Networks2047-49542047-49622023-01-011211810.1049/ntw2.12054Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devicesSelvakumar Manickam0Shafiq Ul Rehman1National Advanced IPv6 Center (NAv6) Universiti Sains Malaysia (USM) George Town Penang MalaysiaNational Advanced IPv6 Center (NAv6) Universiti Sains Malaysia (USM) George Town Penang MalaysiaAbstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. One of the big issues in securing IoT communications is that traditional cryptographical protocols incur high computational costs and are not suitable for resource‐constrained devices. In this paper, the authors focus on issues related to secret keys distribution and authentication schemes. Although there exist some lightweight authentication schemes for IoT devices in the literature, they come with some limitations (e.g. preconfiguration of shared secret keys). A new lightweight authentication scheme suitable for IoT devices is proposed. This scheme incurs low resource utilisation and provides a trusted mode of Secret key distribution between IoT devices and a control server. A real‐time test‐bed environment is deployed to examine whether the authors’ proposed scheme is applicable for resource‐constrained devices. The authors’ performance analysis shows that the proposed scheme is efficient and is resistant to possible security attacks such as replay attacks, man‐in‐the middle attacks, impersonation attacks, modification attacks, and remote access trojan attacks.https://doi.org/10.1049/ntw2.12054cyber threatInternet of thingsIoT securitylightweight authenticationSecret key distributiontrusted communication
spellingShingle Selvakumar Manickam
Shafiq Ul Rehman
Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
IET Networks
cyber threat
Internet of things
IoT security
lightweight authentication
Secret key distribution
trusted communication
title Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
title_full Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
title_fullStr Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
title_full_unstemmed Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
title_short Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
title_sort secured kds secret key distribution and authentication scheme for resource constrained devices
topic cyber threat
Internet of things
IoT security
lightweight authentication
Secret key distribution
trusted communication
url https://doi.org/10.1049/ntw2.12054
work_keys_str_mv AT selvakumarmanickam securedkdssecretkeydistributionandauthenticationschemeforresourceconstraineddevices
AT shafiqulrehman securedkdssecretkeydistributionandauthenticationschemeforresourceconstraineddevices