{"title":"Terminal independent security token derivation scheme for ultra-dense IoT networks","authors":"Vincent Omollo Nyangaresi","doi":"10.1016/j.array.2022.100210","DOIUrl":null,"url":null,"abstract":"<div><p>The Fifth Generation (5G) networks deploy base station ultra-densification to boost data rates, capacities, reliability, energy efficiency as well as the reduction of communication latencies. To increase quality of service as well as quality of experience, a large number of Internet of Things (IoT) communications are relayed over 5G networks. For enhanced pervasive computing, most of the devices in 5G-IoT networks are continuously connected to the network, exchanging massive and sensitive data. Therefore, there is need to protect these networks from both privacy and security attacks. As a result, many security protocols have been presented in literature. Unfortunately, IoT devices are heterogeneous in nature with diverse communication and security architectures. These issues render privacy and security protection extremely challenging. Consequently, majority of the conventional protocols fail to fully address privacy and security issues in 5G-IoT networks. Particularly, user collusion, de-synchronization and side-channeling attacks are ignored in most of the security protocols. On the other hand, some of the developed protocols achieve salient security but at extremely high computation, storage and communication complexities. In this paper, an elliptic curve and biometric based security token derivation scheme is presented. Formal security analysis using Burrows–Abadi–Needham (BAN) logic shows the negotiation of a session key between the communicating parties. On the other hand, informal security analysis shows that this scheme is secure under all the Canetti- Krawczyk (CK) threat model assumptions. In terms of efficiency, the comparative performance evaluation carried out shows that this protocol has the least communication and computation complexities among other related protocols.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"15 ","pages":"Article 100210"},"PeriodicalIF":2.3000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562200056X/pdfft?md5=369e2e6968bbd7581e28ac2e4b87535e&pid=1-s2.0-S259000562200056X-main.pdf","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Array","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S259000562200056X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 13
Abstract
The Fifth Generation (5G) networks deploy base station ultra-densification to boost data rates, capacities, reliability, energy efficiency as well as the reduction of communication latencies. To increase quality of service as well as quality of experience, a large number of Internet of Things (IoT) communications are relayed over 5G networks. For enhanced pervasive computing, most of the devices in 5G-IoT networks are continuously connected to the network, exchanging massive and sensitive data. Therefore, there is need to protect these networks from both privacy and security attacks. As a result, many security protocols have been presented in literature. Unfortunately, IoT devices are heterogeneous in nature with diverse communication and security architectures. These issues render privacy and security protection extremely challenging. Consequently, majority of the conventional protocols fail to fully address privacy and security issues in 5G-IoT networks. Particularly, user collusion, de-synchronization and side-channeling attacks are ignored in most of the security protocols. On the other hand, some of the developed protocols achieve salient security but at extremely high computation, storage and communication complexities. In this paper, an elliptic curve and biometric based security token derivation scheme is presented. Formal security analysis using Burrows–Abadi–Needham (BAN) logic shows the negotiation of a session key between the communicating parties. On the other hand, informal security analysis shows that this scheme is secure under all the Canetti- Krawczyk (CK) threat model assumptions. In terms of efficiency, the comparative performance evaluation carried out shows that this protocol has the least communication and computation complexities among other related protocols.