数字通信与网络(英文)2024,Vol.10Issue(4) :989-1000.DOI:10.1016/j.dcan.2022.12.003

A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita
数字通信与网络(英文)2024,Vol.10Issue(4) :989-1000.DOI:10.1016/j.dcan.2022.12.003

A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

Kumar Sekhar Roy 1Subhrajyoti Deb 2Hemanta Kumar Kalita3
扫码查看

作者信息

  • 1. Department of Computer Science and Engineering,Manipal Institute of Technology Bengaluru,Manipal Academy of Higher Education,Manipal,576104,Karnataka,India
  • 2. Department of Computer Science & Engineering ICFAI University,Agartala,799210,India
  • 3. Department of Computer Science & Engineering,Central Institute of Technology,Kokrajhar,783370,India
  • 折叠

Abstract

The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and adminis-trators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-of-service attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.

Key words

Internet of things/Authentication/Post-quantum cryptography/Lattice-based cryptography/Cloud computing/Fog computing/Fail-safe

引用本文复制引用

出版年

2024
数字通信与网络(英文)

数字通信与网络(英文)

ISSN:
段落导航相关论文