A trustworthy, reliable and lightweight privacy and data integrity approach for the internet of things

Data integrity and authenticity are among the key challenges faced by the interacting devices of Internet of Things (IoT). The resource-constrained nature of sensor-embedded devices make it even more difficult to design lightweight security schemes for these networks. In view of limited resources of...

Full description

Saved in:
Bibliographic Details
Main Authors: Rahim Khan, Jason Teo, Mian Ahmad Jan, Sahil Verma, Ryan Alturki, Abdullah Ghani
Format: Article
Language:English
English
Published: Institute of Electrical and Electronics Engineers 2022
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/33605/1/A%20trustworthy%2C%20reliable%20and%20lightweight%20privacy%20and%20data%20integrity%20approach%20for%20the%20internet%20of%20things.ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/33605/2/A%20Trustworthy%2C%20Reliable%20and%20Lightweight%20Privacy%20and%20Data%20Integrity%20Approach%20for%20the%20Internet%20of%20Things.pdf
https://eprints.ums.edu.my/id/eprint/33605/
https://ieeexplore.ieee.org/document/9789575
https://doi.org/10.1109/TII.2022.3179728
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Sabah
Language: English
English
Description
Summary:Data integrity and authenticity are among the key challenges faced by the interacting devices of Internet of Things (IoT). The resource-constrained nature of sensor-embedded devices make it even more difficult to design lightweight security schemes for these networks. In view of limited resources of the IoT devices, this paper proposes a lightweight and trustworthy device-to-server mutual authentication scheme for edge-enabled IoT networks. Initially, a trusted authority (TA) generates and assigns identities (IDs) and mask them to servers and clients, also known as member devices, in an off-line phase. These IDs are utilized to prevent possible infiltration of the adversary device(s). Next, every device ensures the authenticity of requesting devices using a sophisticated challenge, which is encrypted using a 128-bits secret key, λi. Each device expects a reply from the intended destination device for resolving the encrypted challenge within the defined time-frame, i.e.,△T. Moreover, authenticity of the requesting device is verified through the stored IDs which are shared in the off-line phase. Simulation results have verified the exceptional performance of the proposed authentication scheme against field proven approaches in terms of computational and communication costs, respectively.