{"title":"基于硬件序列化的物联网设备认证方案","authors":"Anum Hasan, K. Qureshi","doi":"10.1109/ICAEM.2018.8536286","DOIUrl":null,"url":null,"abstract":"Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-the middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.","PeriodicalId":427270,"journal":{"name":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Internet of Things Device Authentication Scheme Using Hardware Serialization\",\"authors\":\"Anum Hasan, K. Qureshi\",\"doi\":\"10.1109/ICAEM.2018.8536286\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-the middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.\",\"PeriodicalId\":427270,\"journal\":{\"name\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Applied and Engineering Mathematics (ICAEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAEM.2018.8536286\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Applied and Engineering Mathematics (ICAEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEM.2018.8536286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet of Things Device Authentication Scheme Using Hardware Serialization
Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense, process and communicate data in real time. IoT devices come in varying shapes and sizes with a range of features and resources. When devices are placed ubiquitously the importance of fundamental security goals like authentication increases considerably. Research has mostly studied various aspects of the IoT environment but often miss out on the essential authentication security goal. This paper first studies the latest methods through which authentication is achieved in the IoT. Analysis has shown that the devices lack resources to implement complex authentication algorithms. Another issue with many authentication algorithms is that they are not universally applicable to IoT devices. Based on these findings a novel authentication algorithm is proposed that is based on using device serialization chip. The designed algorithm resists a range of attacks like man-in-the middle, masquerading, device cloning and replay. The scheme is composed of lightweight security primitives that are universally applicable to different types of devices in the IoT for the provision of both authentication and session key generation. The paper presents a security analysis of the proposed scheme to show that the security primitives are a suitable fit and strongly support the system design goals.