A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities

https://doi.org/10.1016/j.jisa.2020.102683Get rights and content

Abstract

Internet of Things (IoT) and edge-enabled networking infrastructures have been used to provide data processing capabilities at the edge rather than transferring it to the concerned cloud in the smart cities. However, security and privacy of both data and device Ci are among common issues associated with the edge-enabled IoT networking paradigm. Numerous edge-enabled mechanisms have been presented in literature to resolve these issues, but device-to-device authentication (preferably in multi-hop enabled networking) to resolve the black-hole issue is not addressed yet. In this paper, a mutual authentication scheme, a hybrid of Medium Access Control (MAC) address and EAODV-enabled scheme, for establishing secure device-to-device communication sessions in IoT networks is presented to make edge-enabled smart cities safe and secure. Every device Ci is bounded to register its Mac address with the concerned base station or edge module Sj in an off-line phase to prevent entry of the intruder device(s) in the operational edge-enabled IoT network. Moreover, the initiation of a proper communication session with both device Ci and edge or base station Sj is subjected to the authentication process. Only those devices Ci are allowed to initiate a communication session which are already registered in the off-line phase where entry of the intruder node(s) at any stage is not possible. Apart from it, a well-known encryption and decryption mechanism is used to guarantee a secure communication session. Simulation results have verified that the proposed mutual authentication scheme performance is better than existing schemes specifically in terms of processing and communication overheads.

Introduction

Due to the technological advancements in the development and miniaturization of numerous electronic devices Ci, researcher organizations are focused on the realization of the edge-enabled smart cities to make lives easier. For this purpose, Internet of Things (IoT) which is defined as the networks of physical objects or things [1]. These objects or devices Ci are embedded with application dependent sensors, actuators and software module to enable these devices to form an operational communication networks where every member device Ci has the capacity to connect and share data with other member devices or things. Moreover, IoT-enabled networks are used in numerous application area such as development of the smart cities, smart buildings and smart transportation where member devices Ci interact directly with environments via the embedded sensors and forward the collected data to a centralized location, i.e., an edge-node Sj, either directly or through multi-hop mechanisms [2], [3]. However, due to the limited processing and communication capacities of these devices Ci, IoT networks are delay sensitive specifically in application time critical application areas such as traffic control in the smart cities which becomes worst if the concerned data is needed to be transferred to a cloud. Moreover, the situation becomes worse if each and every decision related to the IoT-enabled smart cities is subjected to the processing of the collected data on cloud which is usually located in remote and secure areas [4].

To resolve the aforementioned issues associated with IoT-enabled smart cities, edge-enabled IoT networks is presented in literature where majority of the operations (which are needed to perform important decisions) related to an operational IoT networks are performed at the nearest edge rather than at centralized cloud [5]. Although, edge-enabled IoT networks have resolved the aforementioned issues that is data processing is performed at the local edge-node Sj, but these networks are more vulnerable & exposed to numerous security and privacy breaches. Therefore, the embedded security and privacy schemes, both in devices Ci and edge-node Sj, should be smart enough to provide a reliable and secure communication infrastructure for device-to-device and device-to-edge or server module communications and vice versa without compromising on the performance metrics of IoT and edge-enabled networks [6]. To ensure security and privacy of both information and devices Ci or edge-node Sj in IoT and edge-enabled networks, blockchain and ad hoc on-demand vector (AODV) are among the common security and privacy mechanisms where researcher are attracted due to their reliability and transparent nature and are ideal solutions particularly for IoT and edge-enabled smart cities [7]. A blockchain-enabled IoT architecture is presented by S.k. Sing et al. [8] where smart artificial intelligence mechanisms are utilized to provide an efficient blockchain converging way. Moreover, this mechanism is focused on how artificial intelligence and blockchain are used in IoT networks in both scenarios i.e., blockchain-enabled AI and AI-enabled blockchain. Likewise, a secure support vector machine (SVM)-enabled privacy preserving scheme is presented to develop a blockchain enabled secure data exchange platform for the IoT [9]. However, slightly higher communication, computational cost and application specificity are among the common issues associated with these schemes.

Furthermore, numerous authentication schemes have been presented in literature to provide a secure and reliable communication infrastructure for IoT and Edge-enabled networks such as [10], [11], [12], [13]. Although, these mechanisms have resolved the security and privacy issues related to the resource constraint networks such as IoT, these approaches incur a relatively higher communication and computational cost. Similarly, a trust-enabled authentication scheme that is based on the extended ad hoc on demand distance vector (EAODV) routing is presented which is focused on how to resolve the black-hole attack issue associated with the resource constraint networks [13]. Additionally, to address the black-hole issue, a two tier-enabled mechanism is presented for the IoT [14]. Although, these mechanisms have resolved privacy and authenticity issues specifically in device-to-device communication in the operational IoT networks, but complexity and unresolved black-hole attack scenarios are among the common issues associated with these approaches. Security and authenticity of numerous devices Ci is among the common issues associated with the edge-enabled IoT networks. The proposed techniques should have the capacity to provide a reliable and secure communication infrastructure for the edge-enabled IoT networks in both scenarios i.e., device-to-device communication (preferably in multi-hop networks) and device-to-edge node Sj (in scenarios where every device resides within wireless communication range of the edge-node).

In this paper, a mutual authentication and privacy scheme is presented that enabled each and every device Ci to establish a secure device-to-device and device-to-edge communication sessions in the edge-enabled smart cities. This scheme has the capacity to resolve the black-hole issue in multi-hop and edge-enabled IoT networks. Contribution of this research work are

  • 1.

    A novel mutual authentication algorithm for the edge-enabled IoT networks.

  • 2.

    Ensure reliable communication among numerous devices Ci or edge-node Sj in multi-hop edge-enabled IoT networks.

  • 3.

    Secure device-to-device communication for edge-enabled IoT in smart cities.

The rest of the is organized as follows. In subsequent Section 2, a brief literature review preferably of those scheme which are related to the proposed authentication scheme is presented. In Section 3, the proposed mutual authentication scheme is described in detail such as phases, working mechanism and algorithm whereas informal security analysis is presented in the subsequent section. In Section 5, implementation and results of the proposed mutual authentication scheme against existing schemes are described in detail. Finally, concluding remarks and future directions are given.

Section snippets

Literature review

Security and privacy are among the challenging issues associated with IoT in general and edge-enabled IoT networks in particular. In literature, various authentication and security mechanisms have been presented to address these issues particularly without changing the existing technological infrastructure. A complete description of these scheme is beyond the scope of this paper, hence, a brief overview of existing approaches which are closely related to the proposed scheme is presented. A

Proposed methodology: A hybrid approach

In this section, a mutual and light-weight authentication scheme is presented to resolve the black-hole attack problem associated with the edge-enabled IoT networks. The proposed scheme uses two different metrics, that is MAC address of a particular device Ci and EAODV-enabled routing scheme, to form a hybrid mutual authentication which is applicable in cases that is (i) ordinary node to ordinary node authentication (ii) ordinary node Ci to gateway or edge Sj authentication. In former case, if

The proposed authentication scheme’s informal security analysis

In this section, a detailed and thorough analysis of various possible attacks or threats and their prevention in the proposed mutual authentication scheme is described in detail. Moreover, these attacks are possible at various stages or levels in an edge-enable IoT networks that is device Ci level, base station and edge Sj level. A detailed description and handling mechanism of some of these attacks by the proposed scheme in realistic environment of edge-enabled IoT networks is presented below.

Results and performance evaluation

In this section, simulation results are described in detail which are used verify the proposed mutual authentication approach performance against the existing schemes. For evaluation of these algorithms, OMNET++ is used as an implementation tool which is an open source simulation environment for WSNs and IoT. It is to be noted that similar processing & transmission power, on-board batteries, a single base station module were used both for the proposed and existing schemes. Moreover, these

Conclusion and future work

Due to their overwhelming characteristics, Internet of Things (IoT) and edge-enabled networking are used in different application areas to automate various lifetime activities. However, security and authenticity of both information and device Ci are among common issues associated with the edge-enabled IoT networking paradigm in smart cities. In this paper, a mutual authentication scheme, that is a hybrid of Medium Access Control (MAC) address and EAODV-enabled scheme, for establishing secure

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References (30)

  • LinJie et al.

    A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications

    IEEE Internet Things J

    (2017)
  • AlfandiOmar et al.

    A survey on boosting IoT security and privacy through blockchain

    Cluster Comput

    (2020)
  • WuYulei et al.

    Convergence of blockchain and edge computing for secure and scalable iIoT critical infrastructures in industry 4.0

    IEEE Internet Things J

    (2020)
  • ShenMeng et al.

    Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities

    IEEE Internet Things J

    (2019)
  • GopeProsanta et al.

    A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks

    IEEE Trans Ind Electron

    (2016)
  • Cited by (12)

    • Pencil shell matrix based image steganography with elevated embedding capacity

      2021, Journal of Information Security and Applications
      Citation Excerpt :

      Secret data can be destroyed, unlawfully observed, fraudulently copied, or stolen from the source to the destination during the message transmission, or vice versa [2]. We want to prohibit people and computers from getting unwanted entry into the packet of information of our communications [3,4] and files at each and every data transfer. We use encryption and data hiding techniques to do so.

    View all citing articles on Scopus
    View full text