TY - GEN
T1 - Internet of Things Device Authentication Scheme Using Hardware Serialization
AU - Hasan, Anum
AU - Qureshi, Kashifnaseer
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/11/14
Y1 - 2018/11/14
N2 - Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-The middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.
AB - Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-The middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.
KW - authentication
KW - device serialization
KW - IoT
KW - mutual authentication
KW - physically unclonable functions
KW - symmetric key cryptography
UR - http://www.scopus.com/inward/record.url?scp=85058984053&partnerID=8YFLogxK
U2 - 10.1109/ICAEM.2018.8536286
DO - 10.1109/ICAEM.2018.8536286
M3 - Conference contribution
AN - SCOPUS:85058984053
T3 - ICAEM 2018 - 2018 International Conference on Applied and Engineering Mathematics, Proceedings
SP - 109
EP - 114
BT - ICAEM 2018 - 2018 International Conference on Applied and Engineering Mathematics, Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 International Conference on Applied and Engineering Mathematics, ICAEM 2018
Y2 - 4 September 2018 through 5 September 2018
ER -