Cargando…

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment

In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, o...

Descripción completa

Detalles Bibliográficos
Autores principales: Wazid, Mohammad, Das, Ashok Kumar, Shetty, Sachin, J. P. C. Rodrigues, Joel, Park, Youngho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6961035/
https://www.ncbi.nlm.nih.gov/pubmed/31847431
http://dx.doi.org/10.3390/s19245539
_version_ 1783487907541024768
author Wazid, Mohammad
Das, Ashok Kumar
Shetty, Sachin
J. P. C. Rodrigues, Joel
Park, Youngho
author_facet Wazid, Mohammad
Das, Ashok Kumar
Shetty, Sachin
J. P. C. Rodrigues, Joel
Park, Youngho
author_sort Wazid, Mohammad
collection PubMed
description In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT.
format Online
Article
Text
id pubmed-6961035
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-69610352020-01-24 LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment Wazid, Mohammad Das, Ashok Kumar Shetty, Sachin J. P. C. Rodrigues, Joel Park, Youngho Sensors (Basel) Article In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT. MDPI 2019-12-14 /pmc/articles/PMC6961035/ /pubmed/31847431 http://dx.doi.org/10.3390/s19245539 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wazid, Mohammad
Das, Ashok Kumar
Shetty, Sachin
J. P. C. Rodrigues, Joel
Park, Youngho
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
title LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
title_full LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
title_fullStr LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
title_full_unstemmed LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
title_short LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment
title_sort ldakm-eiot: lightweight device authentication and key management mechanism for edge-based iot deployment
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6961035/
https://www.ncbi.nlm.nih.gov/pubmed/31847431
http://dx.doi.org/10.3390/s19245539
work_keys_str_mv AT wazidmohammad ldakmeiotlightweightdeviceauthenticationandkeymanagementmechanismforedgebasediotdeployment
AT dasashokkumar ldakmeiotlightweightdeviceauthenticationandkeymanagementmechanismforedgebasediotdeployment
AT shettysachin ldakmeiotlightweightdeviceauthenticationandkeymanagementmechanismforedgebasediotdeployment
AT jpcrodriguesjoel ldakmeiotlightweightdeviceauthenticationandkeymanagementmechanismforedgebasediotdeployment
AT parkyoungho ldakmeiotlightweightdeviceauthenticationandkeymanagementmechanismforedgebasediotdeployment