Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication

Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authenticat...

Full description

Bibliographic Details
Main Author: Hung-Yu Chien
Format: Article
Language:English
Published: MDPI AG 2021-03-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/7/789
_version_ 1797539900993568768
author Hung-Yu Chien
author_facet Hung-Yu Chien
author_sort Hung-Yu Chien
collection DOAJ
description Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the conventional mechanisms of pseudonym-renewing and pseudonym-bound-public-keys updating could be very costly or be vulnerable to the desynchronization-based denial-of-service (DoS) attacks. In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes. The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can run several instances of the direct D2D anonymous authentication without the involvement of the server. The merits of the schemes include: (1) high efficiency in terms of computation and communication; (2) easy and efficient generation/synchronization of dynamic pseudonyms; (3) robustness to both desynchronization-based DoS attacks and the unreliable connections; (4) easy application to the existent IoT architectures and standards; and (5) formal security verification.
first_indexed 2024-03-10T12:52:22Z
format Article
id doaj.art-8b10a98249344a7c9546d805fda7d21a
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T12:52:22Z
publishDate 2021-03-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-8b10a98249344a7c9546d805fda7d21a2023-11-21T12:11:41ZengMDPI AGElectronics2079-92922021-03-0110778910.3390/electronics10070789Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D AuthenticationHung-Yu Chien0Department of Information Management, National Chi Nan University, Nantou 54561, TaiwanResource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the conventional mechanisms of pseudonym-renewing and pseudonym-bound-public-keys updating could be very costly or be vulnerable to the desynchronization-based denial-of-service (DoS) attacks. In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes. The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can run several instances of the direct D2D anonymous authentication without the involvement of the server. The merits of the schemes include: (1) high efficiency in terms of computation and communication; (2) easy and efficient generation/synchronization of dynamic pseudonyms; (3) robustness to both desynchronization-based DoS attacks and the unreliable connections; (4) easy application to the existent IoT architectures and standards; and (5) formal security verification.https://www.mdpi.com/2079-9292/10/7/789Internet of ThingsauthenticationMQTThashcloudedge services
spellingShingle Hung-Yu Chien
Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
Electronics
Internet of Things
authentication
MQTT
hash
cloud
edge services
title Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_full Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_fullStr Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_full_unstemmed Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_short Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_sort two level composite hashing facilitating highly efficient anonymous iot and d2d authentication
topic Internet of Things
authentication
MQTT
hash
cloud
edge services
url https://www.mdpi.com/2079-9292/10/7/789
work_keys_str_mv AT hungyuchien twolevelcompositehashingfacilitatinghighlyefficientanonymousiotandd2dauthentication