基于硬件序列化的物联网设备认证方案

Anum Hasan, K. Qureshi
{"title":"基于硬件序列化的物联网设备认证方案","authors":"Anum Hasan, K. Qureshi","doi":"10.1109/ICAEM.2018.8536286","DOIUrl":null,"url":null,"abstract":"Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-the middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Internet of Things Device Authentication Scheme Using Hardware Serialization\",\"authors\":\"Anum Hasan, K. Qureshi\",\"doi\":\"10.1109/ICAEM.2018.8536286\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-the middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.\",\"PeriodicalId\":427270,\"journal\":{\"name\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAEM.2018.8536286\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEM.2018.8536286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

摘要

物联网(IoT)中的设备通常无处不在,以便它们能够实时感知、处理和通信数据。物联网设备具有不同的形状和大小,具有一系列功能和资源。当设备无处不在时,像身份验证这样的基本安全目标的重要性就会大大增加。研究主要是研究物联网环境的各个方面,但往往错过了基本的身份验证安全目标。本文首先研究了物联网中认证实现的最新方法。分析表明,设备缺乏资源来实现复杂的认证算法。许多身份验证算法的另一个问题是,它们并不普遍适用于物联网设备。在此基础上,提出了一种基于设备串行芯片的身份验证算法。设计的算法可以抵御一系列攻击,如中间人攻击、伪装、设备克隆和重放。该方案由轻量级安全原语组成,这些原语普遍适用于物联网中不同类型的设备,用于提供身份验证和会话密钥生成。本文对所提出的方案进行了安全性分析,表明安全原语是合适的,并且有力地支持了系统的设计目标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Internet of Things Device Authentication Scheme Using Hardware Serialization
Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-the middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信