International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Secure and Reliable Handoff Authentication Protocol with Batch Verification for Internet of Things Environment

Author NameAuthor Details

Ramandeep Kaur, Sumit Mittal

Ramandeep Kaur[1]

Sumit Mittal[2]

[1]M.M. Institute of Computer Technology and Business Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, Haryana, India

[2]M.M. Institute of Computer Technology and Business Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, Haryana, India

Abstract

Internet is no longer a mere source of information as the concept of interconnectivity has expanded to connect real things or objects like every kind of machines, cars, homes, hospitals, even our bodies through wearable devices. The concept of interconnectivity of billions of objects (mobile or stationary) providing and exchanging real time data is called Internet of Things (IoT). Myriad IoT applications are touching every aspect of our lives and have the latent to develop the basic quality of life for masses. However, prerequisite for successful implementation of any IoT application is uninterrupted and high-quality network connectivity and handling of huge amounts of personal and sensitive user data which gives rise to the questions of security. A handoff authentication protocol with high security and efficiency is required for enabling secure and seamless handoff of mobile nodes between different access points (AP). However, there are number of challenges in designing a secure handoff protocol for IoT systems like limited power of mobile nodes, computational capability, security and vulnerability of open IoT networks. In this paper, we propose a secure and reliable handoff authentication protocol for such IoT devices. Compared with other well-known similar handoff protocols, the protocol proposed here satisfies all relevant security requirements of handoff such as batch verification, mobile node un-traceability, and anonymity and is unaffected by other attacks like replay attacks and also provides mutual authentication. To demonstrate the security strength (against replay attacks) of our protocol, simulation has been done using AVISPA. Thus, protocol proposed by us is more appropriate for IoT environment compared to the alike protocols.

Index Terms

Batch Verification

Authentication

Security

Reliability

Handoff

IoT

AVISPA

Reference

  1. 1.
    Kevin Asthon, “That ’ Internet of Things ’ Thing,” RFID Journal, p. 4986, 2010.
  2. 2.
    Y. Ibrar and Ahmed Ejaz et al, “Internet of Things Architecture?: Recent Advances , Taxonomy , Requirements , and Open Challenges,” IEEE Wireless Communication, no. June, pp. 10–16, 2017.
  3. 3.
    R. Kaur and S. Mittal, “Enhanced Handoff Decision Making for Application-Aware Environment by Using Blended Approach,” International Journal of Intelligent Engneering Systems, vol. 14, no. 1, pp. 433–443, 2020.
  4. 4.
    A. Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, pp. 909–920, 2020.
  5. 5.
    S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, vol. 3, pp. 678–708, 2015.
  6. 6.
    S. R. Moosavi et al., “SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways,” Procedia Computer Science, vol. 52, no. 1, pp. 452–459, 2015.
  7. 7.
    J. L. Hou and K. H. Yeh, “Novel Authentication Schemes for IoT Based Healthcare Systems,” Int. J. Distrib. Sens. Networks, vol. 2015, no. ii, 2015.
  8. 8.
    P. K. Dhillon and S. Kalra, “A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services,” Journal of Ambient Intelligent Smart Environment, vol. 11, pp. 149–164, 2019.
  9. 9.
    S. A. Medaglia, Carlo Maria, “An Overview of Privacy and Security Issues in the Internet of Things,” Giusto D., Iera A., Morabito G., Atzori L. Internet Things. Springer, New York, NY, pp. 367–373, 2010.
  10. 10.
    G. M. Køien, “Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011.
  11. 11.
    J. Liu, Y. Xiao, and C. L. P. Chen, “Authentication and access control in the Internet of things,” Proc. - 32nd IEEE International Conference on Distributed Computing Systems Workshops ICDCSW 2012, pp. 588–592, 2012.
  12. 12.
    R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
  13. 13.
    Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, and S. Shieh, “IoT security: Ongoing challenges and research opportunities,” Proc. - IEEE 7th International Conference on service-oriented computing and applications SOCA 2014, pp. 230–234, 2014.
  14. 14.
    F. L. ?iplea, “A lightweight authentication protocol for RFID,” International Conference on Cryptography and Security Systems, pp. 110-121. Springer, Berlin, Heidelberg, 2014.
  15. 15.
    P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications,” International Journal of Distributed Sensor Networks, vol. 2014, 2014.
  16. 16.
    S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015.
  17. 17.
    S. A. Kumar, T. Vealey, and H. Srivastava, “Security in internet of things: Challenges, solutions and future directions,” Proceedings Annual Hawaii International Conference on System Sciences, vol. 2016-March, pp. 5772–5781, 2016.
  18. 18.
    P. K. Dhillon and S. Kalra, “Secure multi-factor remote user authentication scheme for Internet of Things environments,” International Journal of Communication Systems, vol. 30, no. 16, pp. 1–20, 2017.
  19. 19.
    M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
  20. 20.
    A. Luntovskyy and L. Globa, “Performance, Reliability and Scalability for IoT,” Proceedings International Conference on Information and Digital Technologies 2019, IDT 2019, pp. 316–321, 2019.
  21. 21.
    S. Behrad, E. Bertin, S. Tuffin, and N. Crespi, “A new scalable authentication and access control mechanism for 5G-based IoT,” Future Generation Computer Systems, vol. 108, pp. 46–61, 2020.
  22. 22.
    D. He, C. Chen, S. Chan, and J. Bu, “Secure and efficient handover authentication based on bilinear pairing functions,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 48–53, 2012.
  23. 23.
    D. He, C. Chen, S. Chan, and J. Bu, “Analysis and improvement of a secure and efficient handover authentication for wireless networks,” IEEE Communications Letters, vol. 16, no. 8, pp. 1270–1273, 2012.
  24. 24.
    J. L. Tsai, N. W. Lo, and T. C. Wu, “Secure handover authentication protocol based on bilinear pairings,” Wireless Personal Communications, vol. 73, no. 3, pp. 1037–1047, 2013.
  25. 25.
    D. He, J. Bu, S. Chan, and C. Chen, “Handauth: Efficient handover authentication with conditional privacy for wireless networks,” IEEE Transactions on Computers, vol. 62, no. 3, pp. 616–622, 2013.
  26. 26.
    G. Li, Q. Jiang, F. Wei, and C. Ma, “A New Privacy-Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 80, no. 2, pp. 581–589, 2014.
  27. 27.
    W. Wang and L. Hu, “A secure and effcient handover authentication protocol for wireless networks,” Sensors (Switzerland), vol. 14, no. 7, pp. 11379–11394, 2014.
  28. 28.
    S. A. Chaudhry, M. S. Farash, H. Naqvi, S. H. Islam, and T. Shon, “A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 93, no. 2, pp. 311–335, 2017.
  29. 29.
    X. Duan and X. Wang, “Authentication handover and privacy protection in 5G hetnets using software-defined networking,” IEEE Communication Magazine, vol. 53, no. 4, pp. 28–35, 2015.
  30. 30.
    D. He, S. Chan, and M. Guizani, “Handover authentication for mobile networks: Security and efficiency aspects,” IEEE Networks, vol. 29, no. 3, pp. 96–103, 2015.
  31. 31.
    D. He, S. Zeadally, L. Wu, and H. Wang, “Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography,” Computer Networks, vol. 128, pp. 154–163, 2017.
  32. 32.
    J. L. Tsai and N. W. Lo, “Provably secure anonymous authentication with batch verification for mobile roaming services,” Ad Hoc Networks, vol. 44, pp. 19–31, 2016.
  33. 33.
    D. He, D. Wang, Q. Xie, and K. Chen, “Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation,” Science China Information Sciences, vol. 60, no. 5, pp. 1–17, 2017.
  34. 34.
    Y. Xie, L. Wu, N. Kumar, and J. Shen, “Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network,” Wireless Personal Commununications, vol. 93, no. 2, pp. 523–541, 2017.
  35. 35.
    D. Wang, L. Xu, F. Wang, and Q. Xu, “An anonymous batch handover authentication protocol for big flow wireless mesh networks,” Eurasip Journal Wireless Communication Networks, vol. 2018, no. 1, 2018.
  36. 36.
    R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The internet of things architecture, possible applications and key challenges,” Proceedings - 10th International Conference on frontiers of Information Technology FIT 2012, pp. 257–260, 2012.
  37. 37.
    P. K. Dhillon and S. Kalra, “A lightweight biometrics based remote user authentication scheme for IoT services,” Journal of Information Security and Applications, vol. 34, pp. 255–270, 2017.
  38. 38.
    A. Armando, D. Basin, Y. Boichut, Y. Chevalier, and L. Compagna, “The AVISPA Tool for the Automated Validation,” Computer Aided Verification, vol. 3576, pp. 281–285, 2005.
SCOPUS
SCImago Journal & Country Rank