Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authenticat...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-03-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/10/7/789 |
id |
doaj-8b10a98249344a7c9546d805fda7d21a |
---|---|
record_format |
Article |
spelling |
doaj-8b10a98249344a7c9546d805fda7d21a2021-03-27T00:05:41ZengMDPI AGElectronics2079-92922021-03-011078978910.3390/electronics10070789Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D AuthenticationHung-Yu Chien0Department of Information Management, National Chi Nan University, Nantou 54561, TaiwanResource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the conventional mechanisms of pseudonym-renewing and pseudonym-bound-public-keys updating could be very costly or be vulnerable to the desynchronization-based denial-of-service (DoS) attacks. In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes. The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can run several instances of the direct D2D anonymous authentication without the involvement of the server. The merits of the schemes include: (1) high efficiency in terms of computation and communication; (2) easy and efficient generation/synchronization of dynamic pseudonyms; (3) robustness to both desynchronization-based DoS attacks and the unreliable connections; (4) easy application to the existent IoT architectures and standards; and (5) formal security verification.https://www.mdpi.com/2079-9292/10/7/789Internet of ThingsauthenticationMQTThashcloudedge services |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hung-Yu Chien |
spellingShingle |
Hung-Yu Chien Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication Electronics Internet of Things authentication MQTT hash cloud edge services |
author_facet |
Hung-Yu Chien |
author_sort |
Hung-Yu Chien |
title |
Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication |
title_short |
Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication |
title_full |
Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication |
title_fullStr |
Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication |
title_full_unstemmed |
Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication |
title_sort |
two-level-composite-hashing facilitating highly efficient anonymous iot and d2d authentication |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2021-03-01 |
description |
Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the conventional mechanisms of pseudonym-renewing and pseudonym-bound-public-keys updating could be very costly or be vulnerable to the desynchronization-based denial-of-service (DoS) attacks. In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes. The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can run several instances of the direct D2D anonymous authentication without the involvement of the server. The merits of the schemes include: (1) high efficiency in terms of computation and communication; (2) easy and efficient generation/synchronization of dynamic pseudonyms; (3) robustness to both desynchronization-based DoS attacks and the unreliable connections; (4) easy application to the existent IoT architectures and standards; and (5) formal security verification. |
topic |
Internet of Things authentication MQTT hash cloud edge services |
url |
https://www.mdpi.com/2079-9292/10/7/789 |
work_keys_str_mv |
AT hungyuchien twolevelcompositehashingfacilitatinghighlyefficientanonymousiotandd2dauthentication |
_version_ |
1724201612459638784 |