Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities

https://doi.org/10.1016/j.jnca.2018.07.009Get rights and content

Abstract

The deployment of smart technologies such as smart meters, smart phones, and smart chips has facilitated the development of smart cities. Smart cities include different smart systems such as smart homes, smart grids, etc. These smart systems should be connected together along with huge number of smart objects in the world largest network known as the Internet of Things (IoT). Trusted communication between an IoT object, which could be any device, and smart systems is an essential objective for the security over the IoT. This can be supported by authentication enforcers which, with the large number of connected objects in the IoT, should impose efficient and scalable mobile object authentication solutions. In this paper, a four-layer architecture for mobile object authentication in the context of IoT smart cities is proposed. This architecture is designed to address different IoT challenges such as scalability, mobility, and heterogeneity. Moreover, the architecture is supported by the applicability of a proposed hierarchical elliptic curve identity based signature authentication protocol. The proposed architecture and the proposed authentication protocol have been compared with other related works proposed in the literature. Various design goals of IoT in smart cities have been considered in the comparison along with the computation cost on both the sender and the receiver entities. Results show that the proposed architecture supports more design goals of IoT in smart city than its rival architectures and the proposed authentication protocol has lower computation cost than the other related protocols.

Introduction

Recently, the deployment and development of smart cities have influenced human lifestyle to be moved toward smartness and intelligence (Almobaideen et al., 2017). Smart cities are built by the integration of several smart systems and technologies, such as smart sensor networks, smart meters, smart grids, smart homes, and smart vehicular networks. The connectivity between different smart cities' components is facilitated by the recent deployment of the Internet of Things (IoT) that is considered to be the largest network connecting billions of heterogeneous objects, smart systems, and heterogeneous networks (Cardone et al., 2013; Khan et al., 2012; M. Saadeh et al., 2016; Aloi et al., 2017).

Several studies have been conducted in order to assess the impact of smart cities and technologies on future societies (Almobaideen et al., 2016; Almobaideen et al., 2015). This broad connectivity facilitates data sharing and resource accessing among IoT connected objects. IoT smart mobile objects, such as humans with smartphone, move freely from one smart system to another inside a smart city with the need to gain access to different resources. However, this increases the difficulty of managing IoT objects and introduces the challenge of illegitimate access which makes IoT objects vulnerable to physical threats (Liu et al., 2017). In order to manage trusted communication between IoT smart systems and objects, efficient authentication schemes should be used (M. Saadeh et al., 2016; Liu et al., 2017; Singh et al., 2015). Designing efficient authentication schemes faces many challenges such as scalability, mobility, heterogeneity, and limited capabilities of many IoT objects. These challenges are risen because of the diverse and heterogeneous nature of numerous IoT objects (Hussain, 2017).

Scalability is affected by the overhead of managing huge number of IoT objects. This could negatively influence the performance of authentication schemes, unless scalable solutions are developed (Hussain, 2017). Moreover, mobility of IoT objects is another factor to be considered due to the dynamic nature of some IoT mobile objects. Such objects are free to move from one smart system or location inside a smart city to another while being able to access various resources. Smart systems that are connected to IoT are autonomous regarding their local policies and procedures and heterogeneous regarding their devices, networks, and domains. Consequently, heterogeneity should be considered while designing authentication solutions (Alaa et al., 2017). Another important factor to be considered is the limited capabilities of many IoT objects, referred to as IoT constrained devices, such as sensors, actuators, embedded chips, etc. These devices should be supported by the design of lightweight and efficient authentication solutions that does not require complex computations and large memory space (Hussain, 2017; Granjal et al., 2015).

In this paper a new architecture for mobile object authentication in the context of IoT smart cities is proposed. The proposed architecture presents an extension to IoT three-layer architecture (Zhang et al., 2012; Zheng et al., 2012; Ma et al., 2013). It adds a fourth layer between the network and the application layers in order to manage the storage, protocols mapping, and object mobility services. The design goals for the proposed four-layer architecture are related to the following challenges of object authentication:

  • 1.

    Scalability of IoT with large number of objects which are all connected together.

  • 2.

    Heterogeneity of the various objects, networks, and domains that already exist or expected to exist in the future.

  • 3.

    Mobility of some objects that creates dynamic network topologies by allowing these objects to move between different networks while they still need to be authenticated in order to access resources that exist in these networks. This feature is of special importance since it could be the most difficult to satisfy and intensifies the difficulty of dealing with the other features.

  • 4.

    Limited capabilities, such as storage and processing capabilities, of IoT constrained devices (Alaa et al., 2017). Accordingly, the proposed architecture must allow for authentication solutions that are lightweight, efficient, and require less computation cost and space than traditional solutions do.

The proposed architecture has been compared with other related architectures that exist in the literature according to the above mentioned design goals. Moreover, the applicability of the proposed architecture has been supported by a mobile object authentication protocol which is a modified version of the authentication protocol that has been proposed in (M. Saadeh et al., 2018). The authentication protocol is based on elliptic curve Identity Based Signature (IBS).

IBS is an asymmetric key based approach in which object's identity is used to generate signing and verification keys (Shamir, 1984). The main advantage of IBS over traditional public key cryptography digital signature is that certificate management process is eliminated which reduces the overhead on IoT constrained devices (Girish and Phaneendra, 2014). The main entity in IBS based schemes is the Private Key Generator (PKG) which is responsible for generating objects' private keys based on their identities (Yan et al., 2009). The applicability of the authentication protocol over the proposed architecture is verified formally using Burrows, Abadi, and Needham (BAN) logic (Burrows et al., 1990) and the computation cost of the authentication process is evaluated.

The rest of this paper is organized as follows. Section 2 discusses and summarizes the state-of-the art IoT architectures proposed in the literature. In section 3, the main layers and components of the proposed architecture are discussed. Section 4 discusses the modified object authentication protocol and how it is applied over the proposed architecture. A comparison between the proposed architecture with other related authentication architectures is presented and discussed in Section 5. Finally, Section 6 concludes this paper.

Section snippets

IoT architectures in the literature

There are billions of connected device of various types over IoT, referred to as IoT connected objects, and the number is significantly increasing. Recent studies have shown that traditional internet TCP/IP protocols such as Hypertext Transfer Protocol (HTTP), Transmission Control Protocol (TCP), and Internet Protocol (IP) are not efficient for IoT objects' communication (Granjal et al., 2015; Li et al., 2015; H. Saadeh et al., 2017). Consequently, several IoT architectures have been proposed

The proposed object authentication architecture in the context of IoT smart cities

This section presents the proposed extended architecture of the IoT three-layer architecture by adding additional layer, referred to as the mobility support layer, in order to meet the challenges of designing IoT architecture for smart city. The added layer lays between the network and the application layers. This section discusses the main layers and components in the proposed architecture and how this architecture supports IoT challenges.

Object authentication based on the proposed four-layer architecture

In this section elliptic curve identity based signature protocol, which is proposed in (M. Saadeh et al., 2018), is modified and adapted to be applied over the proposed IoT hierarchical architecture. The private and public keys are generated by Sub-PKGs based on objects' identities. The hierarchal view of the proposed architecture is shown in Fig. 5 which illustrates how the layers' components, discussed previously, are connected and can communicate together in order to perform mobile object

Comparison and discussion

This section presents a comparison between the proposed authentication architecture and other related authentication architectures that have been proposed in the literature as in (Kothmayr et al., 2013; He et al., 2017; Flauzac et al., 2015; Moosavi et al., 2015). Up to the authors' knowledge, limited number of the IoT smart city related papers, which have been proposed in the literature, have considered the authentication of mobile object supported architecture. This has restrict us to compare

Conclusion

In this paper a hierarchical architecture for IoT mobile object authentication in the context of smart cities has been proposed. The proposed architecture is an extension to the IoT basic three-layer architecture. It adds a fourth service layer, referred to as mobility support layer, between the network and the application layers. The main objective of this layer is to support the authentication of smart mobile objects that move between various smart autonomous systems in a smart city. It

Declarations of interest

None.

References (54)

  • W. Almobaideen et al.

    Geographical route selection based on user public transportation and service preferences

  • O. Bello et al.

    Intelligent Device-to-device Communication in the Internet of Things

    (2015)
  • M. Burrows et al.

    A logic of authentication

    ACM Trans. Comput. Syst.

    (1990)
  • L. Buttyan et al.

    Simple logic for authentication protocol design

    Proc. - Comput. Secur. Found. Workshop

    (1998)
  • G. Cardone et al.

    Fostering participaction in smart cities: a geo-social crowdsensing platform

    IEEE Commun. Mag.

    (2013)
  • Z. Cheng

    Simple Tutorial on Elliptic Curve Cryptography

    (2004)
  • O. Flauzac et al.

    New security architecture for IoT network

    Proced. Comput. Sci.

    (2015)
  • L. Foschini et al.

    M2M-based metropolitan platform for IMS-enabled road traffic management in IoT

    IEEE Commun. Mag.

    (2011)
  • Girish et al.

    Identity-based cryptography and comparison with traditional public key encryption: a survey

    Int. J. Comput. Sci. Inf. Technol.

    (2014)
  • Q. Gou et al.

    Construction and strategies in IoT security system

  • J. Granjal et al.

    Security for the internet of things: a survey of existing protocols and open research issues

    IEEE Commun. Surv. Tutorials

    (2015)
  • D. He et al.

    Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system

    IEEE Trans. Inf. Forensics Secur.

    (2017)
  • M.I. Hussain

    Internet of Things: challenges and research opportunities

    CSI Trans. ICT

    (2017)
  • P2413 - Standard for an Architectural Framework for the Internet of Things

    (2016)
  • S. Islam et al.

    A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks

    Annales Des Telecommunications/Ann. Telecommun.

    (2012)
  • S. Islam et al.

    An efficient and provably-secure digital signature scheme based on elliptic curve bilinear pairings

    Theor. Appl. Inf.

    (2012)
  • R. Khan et al.

    Future internet: the internet of things architecture, possible applications and key challenges

  • Cited by (47)

    • On IoT intrusion detection based on data augmentation for enhancing learning on unbalanced samples

      2022, Future Generation Computer Systems
      Citation Excerpt :

      The internal equipment resources of IoT are limited, and its strong heterogeneity makes it extremely difficult to integrate communications within IoT [5]. IoT device access methods can be divided into two categories: one is that it supports TCP/IP protocol, such as GPRS, Wi-Fi, 4G, 5G, etc.; the other is that it does not support TCP/IP protocol, after the gateway performs protocol conversion, it is connected to the IoT, such as Zigbee, Bluetooth and other devices [6,7]. Therefore, deploying a data-driven IDS module at the key nodes of IoT to monitor and collect data on the network segment in real time and analyze suspicious phenomena is an effective intrusion detection method.

    • A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities

      2022, Journal of Information Security and Applications
      Citation Excerpt :

      BAN logic is used in this work since it is useful to verify authentication protocols that are based on fresh values and trust [59]. For more details about BAN logic rules and notations, refer to [56,60]. BAN Logic Notations that are used in this work:

    • Lightweight cryptography in IoT networks: A survey

      2022, Future Generation Computer Systems
      Citation Excerpt :

      This link facilitates processing, pre-processing, and storing IoT node information based on the third party and node requirement [29]. An intruder can introduce various attacks in the middleware in a different way, such as an application security attack [33], unauthorised access attack [34], replay attack [35], sleep deprivation attack [36], data security attack [37] etc. The middleware and application layers both use resource-rich devices that can use traditional cryptography to secure IoT networks.

    • Securing digital ecosystems: Harnessing the power of intelligent machines in a secure and sustainable environment

      2023, Handbook of Research on AI and ML for Intelligent Machines and Systems
    • An efficient gas leakage detection and smart alerting system using IoT

      2023, Artificial Intelligence and Blockchain in Industry 4.0
    View all citing articles on Scopus
    View full text