A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server
Recently, the Internet of Things (IoT) has started to play an important role and one of the states of art solutions to solve various issues in different ICT application domains due to its intrinsic characteristics. However, its security and privacy mechanisms are still not well-tailored and lagging behind. Massive academic and industrial surveys, researches, and studies have been conducted and implemented but the general consensus is that conventional cryptographic methods are not overly suitable for adoption in IoT environments in a straightforward manner without incurring huge operational, computational, storage, and energy costs. Therefore, an alternative is to a lightweight cryptographic method offering high levels of data and system security to mitigate such computational cost, storage capacity, and energy consumption. This paper proposes a lightweight mutual authentication and message exchange scheme between IoT devices via a publically available server based on symmetric and asymmetric hybrid cryptography. The server plays an important role to register and authenticate different IoT devices in a federated environment. Security analysis shows that the proposed scheme satisfies the main security properties and it is resistant against attacks.
KeywordsIoT Lightweight Mutual authentication Cryptographic Cybersecurity Message exchange
- 1.M. Chen, J. Wan, F. Li, Machine-to-machine communications: architectures, standards and applications (2012)Google Scholar
- 3.X. Xiaokang, D.S. Wong, X. Deng, TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks, in 2010 IEEE Wireless Communication and Networking Conference (IEEE, 2010)Google Scholar
- 5.M. Sangeetha, M. Jagadeeswari, Design and implementation of new lightweight encryption technique. Int. J. Innov. Res. Sci. Eng. Technol. (2016)Google Scholar
- 6.T. Xu, J.B. Wendt, M. Potkonjak, Security of IoT systems: design challenges and opportunities, in Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (IEEE Press, 2014), pp. 417–423Google Scholar
- 12.G.U. Devi, E.V. Balan, M.K. Priyan, C. Gokulnath, Mutual authentication scheme for IoT application. Indian J. Sci. Technol. 8, 26 (2015)Google Scholar