A Light-Weight Authentication Scheme for Air Force Internet of Things

02/08/2019
by   Xi Hang Cao, et al.
0

Internet of Things (IoT) is ubiquitous because of its broad applications and the advance in communication technologies. The capabilities of IoT also enable its important role in homeland security and tactical missions, including Reconnaissance, Intelligence, Surveillance, and Target Acquisition (RISTA). IoT security becomes the most critical issue before its extensive use in military operations. While the majority of research focuses on smart IoT devices, treatments for legacy dumb network-ready devices are lacking; moreover, IoT devices deployed in a hostile environment are often required to be dumb due to the strict hardware constraints, making them highly vulnerable to cyber attacks. To mitigate the problem, we propose a light-weight authentication scheme for dumb IoT devices, in a case study of the UAV-sensor collaborative RISTA missions. Our scheme utilizes the covert channels in the physical layer for authentications and does not request conventional key deployments, key generations which may cause security risks and large overhead that a dumb sensor cannot afford. Our scheme operates on the physical layer, and thus it is highly portable and generalizable to most commercial and military communication protocols. We demonstrate the viability of our scheme by building a prototype system and conducting experiments to emulate the behaviors of UAVs and sensors in real scenarios.

READ FULL TEXT
research
10/01/2022

Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment

Internet of Things (IoT) is a distributed communication technology syste...
research
08/03/2022

Securing Synchronous Flooding Communications: An Atomic-SDN Implementation

Synchronous Flooding (SF) protocols can enhance the wireless connectivit...
research
08/11/2022

Secure ambient intelligence prototype for airports

Nowadays, many technological advances applied to the Internet of Things ...
research
01/22/2019

Perils of Zero-Interaction Security in the Internet of Things

The Internet of Things (IoT) demands authentication systems which can pr...
research
01/28/2018

Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation

On-body devices are an intrinsic part of the Internet-of-Things (IoT) vi...
research
04/08/2019

Towards Motion Invariant Authentication for On-Body IoT Devices

As the rapid proliferation of on-body Internet of Things (IoT) devices, ...

Please sign up or login with your details

Forgot password? Click here to reset