Abstract
Recently there is much interest in how to implement IoT/IoE-based Micro Grids (MG). But, privacy and security concerns inhibit the fast adaption of IoT technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as IoT devices. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-of-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the device authentication protocol, which assures low implementation cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Savry, O., Vacherand, F.: Security and privacy protection of contactless devices. The Internet of Things, pp. 409–419. Springer, New York (2010). https://doi.org/10.1007/978-1-4419-1674-7_40
Seo, H., et al.: IOT security technical trend. Korean Inst. Electromagn. Eng. Soc. 24(4), 27–35 (2013)
de Leusse, P., Periorellis, P., Dimitrakos, T., Nair, S.K.: Self managed security cell, a security model for the internet of things and services. In: 2009 First International Conference on Advances in Future Internet, pp. 47–52 (2009)
Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES 2006). LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg. https://doi.org/10.1007/11894063_4, http://www.springer.com/lncs. Accessed 21 Nov 2016
Shin, J., Park, Y.: An authentication protocol using the EXOR and the hash function in RFID/USN. In: Korea Society of Industrial Information Systems, vol. 12, no. 2, pp. 24–29, June 2007
Ahn, H.-S., Bu, K.-D.: Improved authentication protocol for RFID/USN environment. Inst. Electron. Inf. Eng. 46(CI-1), 1–10 (2009)
Savry, O., Vacherand, F.: Security and privacy protection of contactless devices. The Internet of Things, pp. 409–419. Springer, New York (2010). https://doi.org/10.1007/978-1-4419-1674-7_40
Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19–31. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25286-0_2
Eom, T., Yi, J.-H.: Performance evaluation of authentication protocol for mobile RFID privacy. Korean Inst. Commun. Inf. Sci. 36(6), 618–630 (2011)
Acknowledgment
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-00508, Development of blockchain-based embedded devices and platform for IOT security and operational efficiency).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yeom, JC., Zhou, Q., Song, IA., Lee, YS., Ra, Ih. (2019). Authentication Mechanism for IoT Device in Micro Grid Environments. In: Peng, H., Deng, C., Wu, Z., Liu, Y. (eds) Computational Intelligence and Intelligent Systems. ISICA 2018. Communications in Computer and Information Science, vol 986. Springer, Singapore. https://doi.org/10.1007/978-981-13-6473-0_25
Download citation
DOI: https://doi.org/10.1007/978-981-13-6473-0_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6472-3
Online ISBN: 978-981-13-6473-0
eBook Packages: Computer ScienceComputer Science (R0)