Terminal independent security token derivation scheme for ultra-dense IoT networks

IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS
Array Pub Date : 2022-09-01 DOI:10.1016/j.array.2022.100210
Vincent Omollo Nyangaresi
{"title":"Terminal independent security token derivation scheme for ultra-dense IoT networks","authors":"Vincent Omollo Nyangaresi","doi":"10.1016/j.array.2022.100210","DOIUrl":null,"url":null,"abstract":"<div><p>The Fifth Generation (5G) networks deploy base station ultra-densification to boost data rates, capacities, reliability, energy efficiency as well as the reduction of communication latencies. To increase quality of service as well as quality of experience, a large number of Internet of Things (IoT) communications are relayed over 5G networks. For enhanced pervasive computing, most of the devices in 5G-IoT networks are continuously connected to the network, exchanging massive and sensitive data. Therefore, there is need to protect these networks from both privacy and security attacks. As a result, many security protocols have been presented in literature. Unfortunately, IoT devices are heterogeneous in nature with diverse communication and security architectures. These issues render privacy and security protection extremely challenging. Consequently, majority of the conventional protocols fail to fully address privacy and security issues in 5G-IoT networks. Particularly, user collusion, de-synchronization and side-channeling attacks are ignored in most of the security protocols. On the other hand, some of the developed protocols achieve salient security but at extremely high computation, storage and communication complexities. In this paper, an elliptic curve and biometric based security token derivation scheme is presented. Formal security analysis using Burrows–Abadi–Needham (BAN) logic shows the negotiation of a session key between the communicating parties. On the other hand, informal security analysis shows that this scheme is secure under all the Canetti- Krawczyk (CK) threat model assumptions. In terms of efficiency, the comparative performance evaluation carried out shows that this protocol has the least communication and computation complexities among other related protocols.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"15 ","pages":"Article 100210"},"PeriodicalIF":2.3000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562200056X/pdfft?md5=369e2e6968bbd7581e28ac2e4b87535e&pid=1-s2.0-S259000562200056X-main.pdf","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Array","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S259000562200056X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 13

Abstract

The Fifth Generation (5G) networks deploy base station ultra-densification to boost data rates, capacities, reliability, energy efficiency as well as the reduction of communication latencies. To increase quality of service as well as quality of experience, a large number of Internet of Things (IoT) communications are relayed over 5G networks. For enhanced pervasive computing, most of the devices in 5G-IoT networks are continuously connected to the network, exchanging massive and sensitive data. Therefore, there is need to protect these networks from both privacy and security attacks. As a result, many security protocols have been presented in literature. Unfortunately, IoT devices are heterogeneous in nature with diverse communication and security architectures. These issues render privacy and security protection extremely challenging. Consequently, majority of the conventional protocols fail to fully address privacy and security issues in 5G-IoT networks. Particularly, user collusion, de-synchronization and side-channeling attacks are ignored in most of the security protocols. On the other hand, some of the developed protocols achieve salient security but at extremely high computation, storage and communication complexities. In this paper, an elliptic curve and biometric based security token derivation scheme is presented. Formal security analysis using Burrows–Abadi–Needham (BAN) logic shows the negotiation of a session key between the communicating parties. On the other hand, informal security analysis shows that this scheme is secure under all the Canetti- Krawczyk (CK) threat model assumptions. In terms of efficiency, the comparative performance evaluation carried out shows that this protocol has the least communication and computation complexities among other related protocols.

面向超密集物联网网络的终端独立安全令牌衍生方案
第五代(5G)网络部署基站超致密化,以提高数据速率、容量、可靠性、能源效率以及减少通信延迟。为了提高服务质量和体验质量,大量的物联网(IoT)通信通过5G网络中继。为了增强普适计算,5G-IoT网络中的大多数设备都连续连接到网络,交换大量敏感数据。因此,有必要保护这些网络免受隐私和安全攻击。因此,文献中提出了许多安全协议。不幸的是,物联网设备本质上是异构的,具有不同的通信和安全架构。这些问题使得隐私和安全保护极具挑战性。因此,大多数传统协议无法完全解决5G-IoT网络中的隐私和安全问题。特别是用户合谋攻击、反同步攻击和侧信道攻击在大多数安全协议中被忽略。另一方面,一些已开发的协议实现了显著的安全性,但在计算、存储和通信方面具有极高的复杂性。提出了一种基于椭圆曲线和生物特征的安全令牌派生方案。使用Burrows-Abadi-Needham (BAN)逻辑的正式安全分析显示了通信双方之间会话密钥的协商。另一方面,非正式安全性分析表明,该方案在所有Canetti- Krawczyk (CK)威胁模型假设下都是安全的。在效率方面,进行的性能对比评估表明,该协议在其他相关协议中具有最小的通信和计算复杂度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Array
Array Computer Science-General Computer Science
CiteScore
4.40
自引率
0.00%
发文量
93
审稿时长
45 days
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信