Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

10/11/2020
by   Syed W. Shah, et al.
0

Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are exacerbated with increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, lightweight, and secure CA protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys. Our preliminary informal protocol analysis suggests that the proposed protocol is resistant to known attack vectors and thus has strong potential for deployment in securing critical and resource-constrained d2d communication.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/04/2020

Public-Key Based Authentication Architecture for IoT Devices Using PUF

Nowadays, Internet of Things (IoT) is a trending topic in the computing ...
research
02/22/2021

InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

Secure Device-to-Device (D2D) communication is becoming increasingly imp...
research
05/17/2021

Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber-Physical Systems

Cyber-Physical Systems (CPS) connected in the form of Internet of Things...
research
11/18/2018

slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things

The Internet of Things (IoT) is increasingly intertwined with critical i...
research
09/14/2021

A comprehensive secure protocol for all D2D scenarios

To fulfill two integral aims of abating cellular traffic and enhancing e...
research
04/11/2018

IoTSense: Behavioral Fingerprinting of IoT Devices

The Internet-of-Things (IoT) has brought in new challenges in, device id...
research
11/01/2019

Operator and Manufacturer Independent D2D Private Link for Future 5G Networks

Direct Mobile-to-Mobile communication mode known also as Device-to-Devic...

Please sign up or login with your details

Forgot password? Click here to reset