Selina Shrestha, Martin Andreoni Lopez, Michael Baddeley, S. Muhaidat, J. Giacalone
{"title":"一种用于网状网络的限时连续认证协议","authors":"Selina Shrestha, Martin Andreoni Lopez, Michael Baddeley, S. Muhaidat, J. Giacalone","doi":"10.1109/CommNet52204.2021.9641895","DOIUrl":null,"url":null,"abstract":"This paper proposes a novel lightweight authentication protocol for fast and efficient continuous authentication of constrained Internet of Things (IoT) mesh network devices. An initial static authentication takes place at the beginning of a session, during which the secret is securely shared between two parties. Once the session is established, the continuous authentication scheme generates time-bound tokens using the shared secret, a time-varying component, and a random value. These are used to verify the identity of the connected device in fixed time intervals. These time-bound tokens, which only remain valid for a predetermined time frame and ensure the continuity aspect of the mechanism, can be linked back to the original secret at the server for verification. Therefore, lightweight continuous authentication is achieved using only a few low complexity cryptographic operations, like hash and MAC, without the need to perform costly cryptographic operations. In case of failure, the node is temporarily blocked for an exponential function period of past occurrences of failure. Performance evaluation over a mesh routing protocol shows that our proposal fulfills lightweight and low bandwidth constraining requirements while satisfying the security requirements of an authentication scheme.","PeriodicalId":354985,"journal":{"name":"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Time-Bound Continuous Authentication Protocol for Mesh Networking\",\"authors\":\"Selina Shrestha, Martin Andreoni Lopez, Michael Baddeley, S. Muhaidat, J. Giacalone\",\"doi\":\"10.1109/CommNet52204.2021.9641895\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a novel lightweight authentication protocol for fast and efficient continuous authentication of constrained Internet of Things (IoT) mesh network devices. An initial static authentication takes place at the beginning of a session, during which the secret is securely shared between two parties. Once the session is established, the continuous authentication scheme generates time-bound tokens using the shared secret, a time-varying component, and a random value. These are used to verify the identity of the connected device in fixed time intervals. These time-bound tokens, which only remain valid for a predetermined time frame and ensure the continuity aspect of the mechanism, can be linked back to the original secret at the server for verification. Therefore, lightweight continuous authentication is achieved using only a few low complexity cryptographic operations, like hash and MAC, without the need to perform costly cryptographic operations. In case of failure, the node is temporarily blocked for an exponential function period of past occurrences of failure. Performance evaluation over a mesh routing protocol shows that our proposal fulfills lightweight and low bandwidth constraining requirements while satisfying the security requirements of an authentication scheme.\",\"PeriodicalId\":354985,\"journal\":{\"name\":\"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CommNet52204.2021.9641895\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Advanced Communication Technologies and Networking (CommNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CommNet52204.2021.9641895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Time-Bound Continuous Authentication Protocol for Mesh Networking
This paper proposes a novel lightweight authentication protocol for fast and efficient continuous authentication of constrained Internet of Things (IoT) mesh network devices. An initial static authentication takes place at the beginning of a session, during which the secret is securely shared between two parties. Once the session is established, the continuous authentication scheme generates time-bound tokens using the shared secret, a time-varying component, and a random value. These are used to verify the identity of the connected device in fixed time intervals. These time-bound tokens, which only remain valid for a predetermined time frame and ensure the continuity aspect of the mechanism, can be linked back to the original secret at the server for verification. Therefore, lightweight continuous authentication is achieved using only a few low complexity cryptographic operations, like hash and MAC, without the need to perform costly cryptographic operations. In case of failure, the node is temporarily blocked for an exponential function period of past occurrences of failure. Performance evaluation over a mesh routing protocol shows that our proposal fulfills lightweight and low bandwidth constraining requirements while satisfying the security requirements of an authentication scheme.