TY - GEN
T1 - A Time-Bound Continuous Authentication Protocol for Mesh Networking
AU - Shrestha, Selina
AU - Lopez, Martin Andreoni
AU - Baddeley, Michael
AU - Muhaidat, Sami
AU - Giacalone, Jean Pierre
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - This paper proposes a novel lightweight authentication protocol for fast and efficient continuous authentication of constrained Internet of Things (IoT) mesh network devices. An initial static authentication takes place at the beginning of a session, during which the secret is securely shared between two parties. Once the session is established, the continuous authentication scheme generates time-bound tokens using the shared secret, a time-varying component, and a random value. These are used to verify the identity of the connected device in fixed time intervals. These time-bound tokens, which only remain valid for a predetermined time frame and ensure the continuity aspect of the mechanism, can be linked back to the original secret at the server for verification. Therefore, lightweight continuous authentication is achieved using only a few low complexity cryptographic operations, like hash and MAC, without the need to perform costly cryptographic operations. In case of failure, the node is temporarily blocked for an exponential function period of past occurrences of failure. Performance evaluation over a mesh routing protocol shows that our proposal fulfills lightweight and low bandwidth constraining requirements while satisfying the security requirements of an authentication scheme.
AB - This paper proposes a novel lightweight authentication protocol for fast and efficient continuous authentication of constrained Internet of Things (IoT) mesh network devices. An initial static authentication takes place at the beginning of a session, during which the secret is securely shared between two parties. Once the session is established, the continuous authentication scheme generates time-bound tokens using the shared secret, a time-varying component, and a random value. These are used to verify the identity of the connected device in fixed time intervals. These time-bound tokens, which only remain valid for a predetermined time frame and ensure the continuity aspect of the mechanism, can be linked back to the original secret at the server for verification. Therefore, lightweight continuous authentication is achieved using only a few low complexity cryptographic operations, like hash and MAC, without the need to perform costly cryptographic operations. In case of failure, the node is temporarily blocked for an exponential function period of past occurrences of failure. Performance evaluation over a mesh routing protocol shows that our proposal fulfills lightweight and low bandwidth constraining requirements while satisfying the security requirements of an authentication scheme.
KW - Continuous Authentication
KW - Distributed Authentication
KW - IoT
KW - Mesh Networks
UR - http://www.scopus.com/inward/record.url?scp=85124048983&partnerID=8YFLogxK
U2 - 10.1109/CommNet52204.2021.9641895
DO - 10.1109/CommNet52204.2021.9641895
M3 - Conference contribution
AN - SCOPUS:85124048983
T3 - Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021
BT - Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021
A2 - El Bouanani, Faissal
A2 - Ayoub, Fouad
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021
Y2 - 3 December 2021 through 5 December 2021
ER -