Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication

Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authenticat...

Full description

Bibliographic Details
Main Author: Hung-Yu Chien
Format: Article
Language:English
Published: MDPI AG 2021-03-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/7/789
id doaj-8b10a98249344a7c9546d805fda7d21a
record_format Article
spelling doaj-8b10a98249344a7c9546d805fda7d21a2021-03-27T00:05:41ZengMDPI AGElectronics2079-92922021-03-011078978910.3390/electronics10070789Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D AuthenticationHung-Yu Chien0Department of Information Management, National Chi Nan University, Nantou 54561, TaiwanResource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the conventional mechanisms of pseudonym-renewing and pseudonym-bound-public-keys updating could be very costly or be vulnerable to the desynchronization-based denial-of-service (DoS) attacks. In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes. The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can run several instances of the direct D2D anonymous authentication without the involvement of the server. The merits of the schemes include: (1) high efficiency in terms of computation and communication; (2) easy and efficient generation/synchronization of dynamic pseudonyms; (3) robustness to both desynchronization-based DoS attacks and the unreliable connections; (4) easy application to the existent IoT architectures and standards; and (5) formal security verification.https://www.mdpi.com/2079-9292/10/7/789Internet of ThingsauthenticationMQTThashcloudedge services
collection DOAJ
language English
format Article
sources DOAJ
author Hung-Yu Chien
spellingShingle Hung-Yu Chien
Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
Electronics
Internet of Things
authentication
MQTT
hash
cloud
edge services
author_facet Hung-Yu Chien
author_sort Hung-Yu Chien
title Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_short Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_full Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_fullStr Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_full_unstemmed Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication
title_sort two-level-composite-hashing facilitating highly efficient anonymous iot and d2d authentication
publisher MDPI AG
series Electronics
issn 2079-9292
publishDate 2021-03-01
description Resource limitation is quite popular in many Internet of Things (IoT) devices and eavesdropping on the identities of IoT devices could reveal the sensitive information; therefore, high efficiency (computation and communication) and anonymity protection are two desirable properties in IoT authentication and in device-to-device (D2D) authentication. Conventionally, dynamic pseudonyms are widely adopted to protect the device identity privacy in IoT authentication and in D2D communications; however, the conventional mechanisms of pseudonym-renewing and pseudonym-bound-public-keys updating could be very costly or be vulnerable to the desynchronization-based denial-of-service (DoS) attacks. In this paper, we propose a novel 2-level composite hashing (2LCH) mechanism to mitigate the problems, and propose the 2LCH-based anonymous IoT and D2D authentication schemes. The schemes simultaneously achieve high efficiency and strong anonymity for such environments; once two devices successfully complete one instance of the server-assist anonymous authentication, they can run several instances of the direct D2D anonymous authentication without the involvement of the server. The merits of the schemes include: (1) high efficiency in terms of computation and communication; (2) easy and efficient generation/synchronization of dynamic pseudonyms; (3) robustness to both desynchronization-based DoS attacks and the unreliable connections; (4) easy application to the existent IoT architectures and standards; and (5) formal security verification.
topic Internet of Things
authentication
MQTT
hash
cloud
edge services
url https://www.mdpi.com/2079-9292/10/7/789
work_keys_str_mv AT hungyuchien twolevelcompositehashingfacilitatinghighlyefficientanonymousiotandd2dauthentication
_version_ 1724201612459638784