2019
DOI: 10.1109/access.2019.2927818
|View full text |Cite
|
Sign up to set email alerts
|

Protean Authentication Scheme – A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments

Abstract: The IoT edge/sensor nodes are exposed to large attack surface and could easily succumb to several well-known attacks in the wireless sensor network (WSN) domain. Authenticating edge nodes before they join a network, especially after a sleep state, is a critical step to maintain the overall trust of any given IoT local area network (IoT LAN). The low resources and computational constraints of such IoT nodes make this a challenging and non-trivial problem. As many IoT deployments are in uncontrolled environments… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…However, it does not provide backward secrecy, and nor does it prevent DoS attacks from happening. Furthermore, the secret key for the sensor remains the same, rendering it vulnerable in cases where an attacker gains the key using a memory dump or any other process [40]. It is also vulnerable to an impersonation attack.…”
Section: B Continuous Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it does not provide backward secrecy, and nor does it prevent DoS attacks from happening. Furthermore, the secret key for the sensor remains the same, rendering it vulnerable in cases where an attacker gains the key using a memory dump or any other process [40]. It is also vulnerable to an impersonation attack.…”
Section: B Continuous Authenticationmentioning
confidence: 99%
“…Thus, our protocol prevents all future sessions from being compromised, even in cases where the attacker has stolen the current secret key SK SN . Additionally, the protocol in [39] does not prevent impersonation [40] and does not consider mitigating DoS attacks. For Chuang et al's protocol [39], forward secrecy is only provided for partially in the token T K SN (continuous phase).…”
Section: Security Propertiesmentioning
confidence: 99%
“…However, with the IoT edge nodes being exposed to different types of attacks, in [8], the focus was made on developing a lightweight authentication model for constrained end-devices, therefore ensuring security.…”
Section: Related Workmentioning
confidence: 99%
“…With the increase in the number of IoT devices and applications, various security approaches have been introduced to make them more powerful and resilient against various attacks. The work carried out by Sathyadevan et al [15] introduced lightweight authentication mechanism IoT end-devices where gateway plays as a role of an edge computing node. The work of Shin et al [16] offered a route optimization scheme based on Distributed IP Mobility Management to offer a key exchange, interactive authentication, and privacy preservation.…”
Section: A the Backgroundmentioning
confidence: 99%