IoT Security Advances in Authentication
IoT Security Advances in Authentication
IoT Security Advances in Authentication
IoT Security
Advances in Authentication
Edited by
Madhusanka Liyanage
School of Computer Science, University College Dublin, Ireland
Centre for Wireless Communications, University of Oulu, Finland
An Braeken
Industrial Engineering, Vrije Universiteit Brussels, Belgium
Pardeep Kumar
Department of Computer Science, Swansea University, UK
Mika Ylianttila
Centre for Wireless Communications, University of Oulu, Finland
This edition first published 2020
© 2020 John Wiley & Sons Ltd
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise,
except as permitted by law. Advice on how to obtain permission to reuse material from this title is available
at http://www.wiley.com/go/permissions.
The right of Madhusanka Liyanage, An Braeken, Pardeep Kumar and Mika Ylianttila to be identified as the
authors of the editorial material in this work has been asserted in accordance with law.
Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
Editorial Office
The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
For details of our global editorial offices, customer services, and more information about Wiley products
visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that
appears in standard print versions of this book may not be available in other formats.
While the publisher and authors have used their best efforts in preparing this work, they make no
representations or warranties with respect to the accuracy or completeness of the contents of this work and
specifically disclaim all warranties, including without limitation any implied warranties of merchantability or
fitness for a particular purpose. No warranty may be created or extended by sales representatives, written
sales materials or promotional statements for this work. The fact that an organization, website, or product is
referred to in this work as a citation and/or potential source of further information does not mean that the
publisher and authors endorse the information or services the organization, website, or product may provide
or recommendations it may make. This work is sold with the understanding that the publisher is not engaged
in rendering professional services. The advice and strategies contained herein may not be suitable for your
situation. You should consult with a specialist where appropriate. Further, readers should be aware that
websites listed in this work may have changed or disappeared between when this work was written and when
it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial
damages, including but not limited to special, incidental, consequential, or other damages.
10 9 8 7 6 5 4 3 2 1
v
Contents
1 Introduction to IoT 3
Anshuman Kalla, Pawani Prombage, and Madhusanka Liyanage
1.1 Introduction 4
1.1.1 Evolution of IoT 4
1.2 IoT Architecture and Taxonomy 5
1.3 Standardization Efforts 7
1.4 IoT Applications 10
1.4.1 Smart Home 11
1.4.2 Smart City 13
1.4.3 Smart Energy 14
1.4.4 Healthcare 15
1.4.5 IoT Automotive 16
1.4.6 Gaming, AR and VR 16
1.4.7 Retail 17
1.4.8 Wearable 18
1.4.9 Smart Agriculture 18
1.4.10 Industrial Internet 19
1.4.11 Tactile Internet 19
1.4.12 Conclusion 20
Acknowledgement 20
References 20
Index 279
xiii
Madhusanka Liyanage
School of Computer Science, University College, Ireland.
Centre for Wireless Communications, University of Oulu, Finland.
Madhusanka Liyanage received the BSc degree (First Class Honors) in electronics
and telecommunication engineering from the University of Moratuwa, Moratuwa,
Sri Lanka, in 2009, his ME degree from the Asian Institute of Technology, Bangkok,
Thailand, in 2011 and an MSc degree from the University of Nice Sophia Antipolis,
Nice, France in 2011. In 2016, Liyanage received a PhD in communication engineering
from the University of Oulu, Oulu, Finland. He is currently an Assistant Professor/Ad
Astra Fellow at the School of Computer Science, University College, Ireland. He is
also an adjunct Professor at the Centre for Wireless Communications, University of
Oulu, Finland. Moreover, he is a visiting lecturer at Yangon Technological University,
Myanmar and University of Moratuwa, Sri Lanka. During 2018–2020, he was a Marie
Curie Fellow at the School of Computer Science, University College, Ireland. In
2011–2012, he was a research scientist at I3S Laboratory and Inria, Shopia Antipolis,
France. Also, he was a visiting research fellow at CSIRO-Australia, Lancaster University,
The University of New South Wales, The University of Sydney, Sorbonne University
xiv About the Editors
and Oxford University from 2016 to 2019. His research interests include SDN, IoT,
Blockchain, mobile and virtual network security. He is a Member of IEEE. Madhusanka
is co-author of over 70 publications including two edited books with Wiley. He is also
a management committee member of EU COST Action IC1301, IC1303, CA15107,
CA15127, CA16116 and CA161226 projects. URL: http://madhusanka.com.
An Braeken
Industrial Engineering, Vrije Universiteit Brussel, Belgium.
An Braeken obtained her MSc Degree in Mathematics from the University of Gent
in 2002. In 2006, she received her PhD in engineering sciences from the KU Leuven
at the research group COSIC (Computer Security and Industrial Cryptography). She
became professor in 2007 at the Erasmushogeschool Brussel (currently since 2013, Vrije
Universiteit Brussel) in the Industrial Sciences Department. Prior to joining the Eras-
mushogeschool Brussel, she worked for almost 2 years at the management consulting
company Boston Consulting Group (BCG). Her current interests include security and
privacy protocols for IoT, cloud and fog, blockchain and 5G security. She is (co-)author
of over 150 publications. She has been member of the program committee for numerous
conferences and workshops (IOP2018, EUC 2018, ICNS 2018, etc.) and member of the
editorial board for Security and Communications magazine. She has also been member
of the organizing committee for the IEEE Cloudtech 2018 conference and the Blockchain
in IoT workshop at Globecom 2018. In addition, since 2015 she is reviewer for several EU
proposals and ongoing projects, submitted under the programs of H2020, Marie Curie
and ITN. She has cooperated and coordinated more than 15 national and international
projects. She has been STSM manager in the COST AAPELE project (2014–2017) and
is currently in the management committee of the COST RECODIS project (2016–2019).
About the Editors xv
Pardeep Kumar
Department of Computer Science, Swansea University, UK.
Mika Ylianttila
Centre for Wireless Communications, University of Oulu, Finland.
Mika Ylianttila (M.Sc, Dr.Sc, eMBA) is a full-time associate professor (tenure track) at
the Centre for Wireless Communications (CWC), at the Faculty of Information Tech-
nology and Electrical Engineering (ITEE), University of Oulu, Finland. He is leading a
research team and is the director of communications engineering doctoral degree pro-
gram. Previously he was the director of Center for Internet Excellence (2012–2015),
vice director of MediaTeam Oulu research group (2009–2011), and professor (pro tem)
in computer science and engineering, and director of information networks study pro-
gramme (2005–2010). He received his doctoral degree on Communications Engineer-
ing at the University of Oulu in 2005. He has coauthored more than 150 international
peer-reviewed articles. His research interests include edge computing, network secu-
rity, network virtualization and software-defined networking. He is a Senior Member of
IEEE, and Editor in Wireless Networks journal.
xvii
List of Contributors
Alexander J. M. Milne received his degree in computer science from Swansea Uni-
versity, Wales, UK in 2018. Following his degree, he worked at Swansea University on
a Cherish de funded project in collaboration with Oyster Bay Systems. He is currently
a student at Swansea University doing a Chess II funded masters by research on
Blockchain.
Anca Delia Jurcut received a Bachelor of Mathematics and Computer Science from
West University of Timisoara, Romania (2007) and a PhD from University of Limerick,
Ireland (2013). From 2008 to 2013, she was a Research Assistant with the Data Commu-
nication Security Laboratory at University of Limerick, and from 2013 to 2015 she was
working as a postdoctoral researcher in the Department of Electronic and Computer
Engineering at the University of Limerick and as a software engineer at IBM, Ireland.
Since 2015, she has been an Assistant Professor with the School of Computer Science,
University College Dublin, Ireland. Her research interests focuses on network and data
security, security for internet of things (IoT), security protocols, formal verification tech-
niques and applications of blockchain technologies in cybersecurity.
Anshuman Kalla is an Associate Professor at Department of Computer and Com-
munication Engineering, School of Computing & Information Technology, Manipal
University Jaipur, India. Dr. Kalla graduated as an engineer from Govt. Engineering
College Bikaner in 2004. He received his Master of Science in Telecommunications
and Wireless Networking from ISEP, France in 2008 and another Master from UNICE,
France in 2011. He obtained Ph.D. degree in 2017. Dr. Kalla was recipient of Master’s
scholarships for pursuing both the Master programs. His area of interest is Future
Networking – Information Centric Networking (ICN), Internet of Things (IoT), SDN
and Blockchain.
Arnold Beckmann received his PhD and “Habilitation” in Mathematics from
University of Münster. He gained post-doctoral experiences at University of Oxford,
University of California in San Diego, and Vienna University of Technology. He is cur-
rently Professor of Computer Science at Swansea University, and Head of Department
of Computer Science. Arnold conducts research in fundamentals of Computer Science,
based on Mathematical Logic and Theoretical Computer Science. He is member of
Council of the Association Computability in Europe (ACiE), and chair of The Proof
Society (TPS). He is Editorial Board member of journals Annals for Pure and Applied
Logic, Archive for Mathematical Logic, Computability, and Managing Editor of the book
series Perspectives in Logic. He has edited 11 journal special issues and 5 proceedings
volumes, and served as PC co-chair of 3 major conferences. Arnold has developed a
xviii List of Contributors
computing (SOFIST)”, funded through the ARC grant for Concerted Research Actions,
Fédération Wallonie-Bruxelles. Dr. Sharma is a member of IEEE since 2008 and he has
authored/coauthored more than 45 journal/conference articles and book chapters. He
serves as reviewer of IEEE Systems Journal, IEEE Sensors Journal, Future Generation
Computer Systems and Journal of Information Security and Applications. He was
the TPC member of ICISSP’18, GlobeCom’18, IndiaCom’18, SPIN’s18, CRIS’18.
Dr. Sharma also edited a special issue on “Advanced Research in Privacy and Forensic
Analytic of Web Engineering”, International Journal of Information Technology and
Web Engineering (IJITWE), IGI Global.
Gurjot Singh Gaba received the M.Tech (Electronics & Communication) degree from
the Guru Nanak Dev Engg. College, Ludhiana of India in 2011. After completing his
M.Tech, he joined Lovely Professional University, Jalandhar of India in July, 2011. His
name is very well known in the field of Research. His research works are acknowledged
by IEEE conference, national conference and international journals. He has been the
executive member of RAECT national conference. His research interests are in the field
of Wireless Sensor Networks. He is the live member of the Institute of Electrical and
Electronics Engineers (IEEE-USA), life member of The Indian Science Congress Asso-
ciation, Kolkata (India), International Association of Engineers (IAENG-USA), Interna-
tional Association of Computer Science and Information Technology, Singapore.
Guy Van der Sande was born in Belgium in 1978. He received the Master’s degree
in electrotechnical engineering with a major in photonics from the Vrije Universiteit
Brussel (VUB), Brussels, Belgium, in 2001. He received the title of Doctor in the
applied sciences from the Department of Applied Physics and Photonics, VUB, in
2005. His Ph.D. program was awarded with the prize “Ignace Vanderschueren” for the
best PhD thesis in Basic, Natural and Applied Science of the last 6 years at the Vrije
Universiteit Brussel. In 2006, he was postdoctoral researcher at Optique Nonlinéaire
Théorique (ULB) with prof. Thomas Erneux, where he did research on nonlinear
dynamics vertical-cavity surface-emitting lasers, metamaterials and dynamics of
spatially extended nonlinear optical systems. In 2007, he was a visiting scientist at
the Institute for Cross-Disciplinary Physics and Complex Systems (IFISC) in the
Universitat de les Illes Balears, Palma de Mallorca, Spain (under supervision of Prof.
Dr. Claudio R. Mirasso and invited by Prof. Maxi San Miguel), where he worked
on nonlinear dynamics of large networks of delay-coupled nonlinear oscillators. In
2013, he was granted a Research Professor fellowship at the Vrije Universiteit Brussel.
Since 2012, he provides Physics and Photonics education to bachelor and master
students in Sciences and Engineering. His current research interests include modeling
and nonlinear dynamics of semiconductor lasers, synchronization phenomena and
bio-inspired information processing. He is author of more than 60 journal papers and
80 conference papers of which 6 invited talks, with an h-index of 25.
Jose Razafindrakoto received his B.Sc. degree in Computer Science, Master of
Research in Logic and Computation, and Ph.D. degree in Computer Science from
Swansea University. He is currently an associate lecturer in Computer Science at
Swansea University. His current research interests include Bounded Arithmetic,
Propositional Proof Complexity and Computational Complexity Theory. Recently, he
has developed an interest in blockchain technology, its underlying software devel-
opment and related formal methods questions. He is also a founding member of the
Swansea University Blockchain Lab.
xx List of Contributors
and Information Engineering in 2010 from University of Ruhuna, Sri Lanka and Master’s
Degree in Information and Communication Technology (ICT) in 2013 from University
of Agder, Norway. Pasika is focused on enhancing the security measures in Multi-access
Edge Computing (MEC) and Internet of Things (IoT) integration. His research directives
extend to the areas lightweight security protocols, 5G and MEC integration technolo-
gies, Privacy preservation techniques and IoT security.
Pawani Porambage is Postdoctoral Researcher at the Centre for Wireless Commu-
nications, University of Oulu, Finland. She obtained her Bachelor Degree in Electronics
and Telecommunication Engineering in 2010 from University of Moratuwa, Sri Lanka
and her Master’s Degree in Ubiquitous Networking and Computer Networking in 2012
from University of Nice Sophia-Anipolis, France. In 2014 she was a visiting researcher
at CSG, University of Zurich and Vrije Universiteit Brussel. Her main research interests
include lightweight security protocols, security and privacy in IoT, MEC, Network Slic-
ing, and Wireless Sensor Networks. She has co-authored more than 30 peer reviewed
scientific articles.
Veronika Kuchta obtained her Diploma degree (equiv. to Master degree) in Mathe-
matics from Karls-Ruprecht University of Heidelberg (Germany) and her PhD degree in
applied cryptography form University of Surrey (United Kingdom) under the supervi-
sion of Dr. Mark Manulis. The focus of her PhD thesis was on distributed cryptographic
protocols. From December 2015 to March 2018 she was a postdoctoral researcher with
the Université libre de Bruxelles (ULB, Belgium). In this time she was a member of the
QualSec (quality and security of information systems) group under the supervision of
professor Olivier Markowitch and she was working on a project called SeCloud, focus-
ing on security-driven engineering of cloud-based applications. Since March 2018 she
has been Research Fellow at Monash University, Melbourne, Australia under the super-
vision of Dr. Joseph K. Liu. Her research interests lie in the areas of post-quantum
cryptography, zero-knowledge proofs, blockchain. She designed several lattice-based
cryptographic protocols which were pubished and presented at the international con-
ferences. Furthermore, she is interested in different aspects of code-based cryptography
and their relation to lattice-based cryptoschemes and application to the research area
of blockchain.
Vikramajeet Khatri graduated with M.Sc. IT from Tampere University of Tech-
nology, Finland. He is working as security specialist at Nokia Bell Labs Finland. His
research interests include intrusion detection, malware detection, IoT security and
cloud security.
xxiii
Preface
The Internet of things (IoT) is the network of physical devices such as vehicles, home
appliances sensors, actuators and other electronic devices. The development of the
Internet offers the possibility for these objects to connect and exchange data. Since the
IoT will play a major role in human life, it is important to secure the IoT ecosystem in
order for its value to be realized. Among the various security requirements, authenti-
cation to the IoT is important as it is the first step in prevention of any negative impact
of possible attackers.
This book provides reference material on authentication in IoT. It offers an insight
into the development of various authentication mechanisms to provide IoT authentica-
tion across various levels such as user level, device level and network level. This book
offers reference material which will be important for all relative stakeholders of mobile
networks, for example, network operators, cloud operators, IoT device manufacturers,
IoT device users, wireless users, IoT standardization organizations and security solution
developers.
IoT
Over the last four decades, the Internet has evolved from peer-to-peer networking,
world-wide-web, and mobile-Internet to the IoT. The IoT is a network consisting of
animals, people, objects, physical devices, e.g., home appliance sensors, actuators,
vehicles, digital machines, and other electronic devices that can collect and exchange
data with each other without human intervention. The communication in IoT is
either between people, between people and devices, and between devices themselves,
also called machine-to-machine (M2M). Many benefits are realized through these
interactions using a variety of technologies including sensors, actuators, controls,
mobile devices and cloud servers as now people and things can be connected any time,
any place, with anything and anyone, ideally using any path or network and any service.
Following analysis of Statista in 2019, it is estimated that there will be approximately
31 billion connected IoT devices worldwide in 2020, which may even be doubled by
2024. From 2017 onwards, the overall market of IoT has become worth more than one
billion US dollars annually. According to the same study, it turns out that the largest IoT
market is represented by the consumer electronics industry. The highest IoT-related
investments have been seen, for the moment, in travel, transportation and hospitality
industries. A very promising market for realizing large growth in IoT is considered to
xxiv Preface
be the automotive industry. Other markets are retail, logistics, construction and agri-
culture. Consequently, it can be concluded that IoT will have a vital impact on a lot of
industries. It will, in many cases, enable a smarter decision-making process based on
context-aware information. The main motivations to integrate IoT are the increase in
both efficiency and convenience.
of a secret shared key. However, to establish such a secret shared key, authentication of
the devices, being the verification of the identities while sending and receiving messages,
is required. Achieving authentication in a robust way is far harder.
Authentication mechanisms should be considered at a number of different levels,
going from user, device to network. Each level has its own particularities, resulting in
different types of solutions to offer efficient authentication. For instance, at the user
level, biometrics play a very important role in the integration of authentication schemes.
For the device, variants such as physical unclonable functions (PUFs), but also tamper
resistant memory are important aspects to be considered. Finally, at the network level,
different architectures should be considered.
One common feature for all the proposed solutions is efficiency, both from a com-
munication as well as a computation point of view. Additional security features, such as
anonymity, unforgeability and non-repudiation, are also required in some cases. There-
fore, mechanisms to be considered will be based on symmetric key (aiming for effi-
ciency) and public key cryptography (aiming for additional security features).
Moreover, the choice of the authentication mechanism is also largely dependent on
the specific use case since each use case has a different type of architecture, resulting in
different requirements with respect to security features and efficiency.
In any case, one of the main goals is to keep the computational, communication and
storage overhead as low as possible at the side of the IoT device, which is typically the
most constrained device.
Intended Audience
One of the major challenges for IoT adoption is (robust) authentication, which is a basic
security process and is sorely needed at first place in the IoT. Although authentication is
one of the paramount requirements of IoT networks, many of the authentication related
techniques and standards are still under development. Therefore, there are only a limited
number of books, which partly address the authentication in IoT. However, such rapid
adaptation of IoT networks will soon raise the requirement of a complete handbook of
Authentication in IoT.
This book will be of key interest for:
Consumer Internet of things ( CIoT). As the consumer adoption of the IoT is evolving,
it is important to understand the typical authentication mechanisms to keep illegal
entities away from the IoT networks. This book will offer the required guidelines for
authentication and its techniques to protect the IoT from unauthorized entities.
Service providers. Service providers are currently actively looking to adopt IoT technol-
ogy to offer new and state-of-the-art secure services to IoT customers. This book will
be a great source of security material that can provide insights for the authentication
mechanisms in IoT networks.
Network operators ( NOs). Network operators try equally to reach large customer bases
who will switch to IoT networks. Security is the key requirement while connecting
the IoT devices with the core networks of large operators.
IoT device manufacturers. Security is one of the key areas of interest for IoT device man-
ufacturers as security challenges outpace the traditional tools available to the market.
xxvi Preface
This book will offer a single source of all the authentication-related topics for the
device manufacturer.
Academics. IoT security has already been an area of research and study for major edu-
cational institutions across the world. With IoT evolvement as the future of humans,
there is no such reference and book available (particularly on authentication in IoT)
that academics can use for teaching this as an area of interest.
Technology architects. IoT is going to cross the traditional mobility borders and is going
to have an equal impact on all enterprises and organizations who plan to transform
into digital businesses. It would be critical for architects to start aligning their technol-
ogy and security architectures to the future needs of IoT standards. This book offers
resources to design and build an authentication architecture and maintain it.
IoT organizations and digital organizations. IoT is going to change the way industrial
networks are built, 5G is going to provide the underlying platform for IoT networks.
Security has remained the top priority for industries due to criticality and sensitiv-
ity of the data and information flows in their networks. A beforehand, knowledge of
5G security principles, components and domains is going to help industries lay out
a foundation of IoT security. This book will provide the guidelines and best practices
for 5G based IoT security and authentication.
Book Organization
The book is divided into five parts covering various aspects of IoT authentication: IoT
Overview, IoT network level, IoT user level, IoT device level and IoT use cases.
Part I consists of an introduction to IoT and an introduction to the corresponding
security threads. Chapter 1 introduces IoT in a pedagogical manner by presenting its
evolution, the taxonomy and the proposed architectures and standardization efforts.
It also illustrates some of the popular applications of IoT. In Chapter 2, security chal-
lenges at every layer are addressed in detail by considering both the technologies and
the architecture used. A thorough survey is provided, together with a classification of
the existing vulnerabilities, exploitable attacks, possible countermeasures and the access
control mechanisms including authentication and authorization. Additionally, solutions
for remediation of the compromised security, as well as methods for risk mitigation, with
prevention and improvement suggestions are discussed.
Part II contains the chapters related to the protection at network level. In Chapter
3, different methods to provide key establishment and authentication using symmetric
key based mechanisms limited to hashing, xoring and encryption/decryption opera-
tion are discussed. A new key management protocol for wireless sensor networks with
hierarchical architecture, using solely symmetric key based operations, is proposed.
Chapter 4 describes the utilization of Elliptic Curve Cryptography (ECC) for design-
ing security protocols in terms of authentication, key establishment, signcryption, and
secure group communication. Chapter 5 provides a general overview of a post-quantum
security primitive, being the lattice-based primitive. The chapter summarizes how this
primitive can be applied to IoT and gives a review on the state-of-the-art of proposed
applications in literature.
Preface xxvii
Part III is about the user-level authentication and consists of four chapters. Chapter
6 deals with the anonymous mutual authentication scheme in multi-access edge com-
puting environments (MEC). It will utilize the password-based approach for the user
authentication. Chapter 7 proposes a biometric-based access control model in industrial
IoT applications. The model will perform a robust authentication and establish a session
key between the user and smart devices IIoT. In Chapter 8, authentication is discussed
in case the user can experience IoT enabled services without carrying any gadget, also
called the naked approach. A use case from the medical and healthcare sector has been
worked out in order to enable the patient an ambient Internet of Everything experience.
Chapter 9 discusses a user-friendly Web-based framework for handling user requests
automatically by addressing user concerns for mobility support, ownership support,
and immediate privilege updates having the goal of limiting the involvement of any
third-parties in the process chain and also to inform all involved parties immediately
about any status changes.
Part IV of the book contains two chapters related to device-level authentication. In
Chapter 10, an authentication mechanism is discussed in case the IoT nodes contain a
PUF, which is a low-cost primitive exploiting the unique random patterns in the device
allowing it to generate a unique response for a given challenge. The advantage of a PUF at
the IoT is that even when the key material is extracted, an attacker cannot take over the
identity of the tampered device. However, in practical applications, the verifier, orches-
trating the authentication between the two IoT nodes, represents a cluster node in the
field, who might be vulnerable for corruption or attacks. In the proposed authentication
mechanism, additional protection has been provided for this. Chapter 11 presents an
encryption and authentication scheme suitable for ASIC or Field-Programmable Gate
Array (FPGA) hardware implementation, which is based on the generalized synchro-
nization of systems showing chaotic dynamical behavior. The strength of the system
relies on the unobservability of the internal states of a strongly nonlinear system having
a high-dimensional phase space.
Part V contains three chapters dedicated to a use case in the healthcare, smart grid,
connected cyber physical system. Chapter 12 introduces a remote patient monitoring
platform that consists of three main parts, patient monitoring devices, cloud backend
and the hospital’s clinician application. The system has been implemented for a pilot
project and in a joint research with neuro and cardiology departments of Helsinki Uni-
versity Hospital (HUS).
Chapter 13 proposes a secure and efficient privacy-preserving scheme in a connected
smart grid network. The scheme is based on ECC, outperforming both in communi-
cation and communication costs. Chapter 14 first discusses the overlapping in cyber
physical system and IoT, and then proposes a cyber physical trust system that utilizes
the blockchain as a security tool. The security strength is shown in terms of data authen-
ticity, integrity and identity.
xxix
Acknowledgments
This book focuses on IoT authentication, which has been created through the joint
efforts of many people. First of all, we would like to give thanks to all of the chapter
authors for doing a great job!
This book would not have been possible without the help of many people. The initial
idea for this book originated during our joint research work in 6Genesis Flagship (grant
no. 318927) project, two COST Action projects (i.e. CA15127 RECORDIS and CA16126
SHELD-ON) and RESPONSE 5G (Grant No: 789658) Marie Skłodowska-Curie Actions
(MSCA) project. We thank the European Union and MSCA Research Fellowship Pro-
gramme who funded the above projects. We thank all the reviewers for helping us select
suitable chapters for the book. Moreover, we thank anonymous reviewers who evaluated
our proposal and provided many useful suggestions for improvement. We also thank
Sandra Grayson from John Wiley and Sons for her help and support in getting this book
published.
Also, the authors are grateful to the School of Computer Science at University College
Dublin, Centre for Wireless Communication (CWC) at University of Oulu, Department
of Computer Science at Swansea University and Department of Industrial Engineering
at Vrije Universiteit Brussel for hosting the IoT Security related research projects which
helped us gain the fundamental knowledge for this book. Last but not least, we would
like to thank our core and extended families and friends for their love and support in
getting the book completed.
Part I
IoT Overview
3
Introduction to IoT
Anshuman Kalla, Pawani Prombage, and Madhusanka Liyanage
Abstract
The successful existence of the Internet, its proven potential to cater to day-to-day needs
of people from all walks of life and its indispensability to society at large, together have
propelled the evolution of the current Internet to the next level termed as the Internet
of Things (IoT). As a witness to the dawn of IoT revolution, what we are experiencing
(and will continue in to do so in the near future at an exponential and astonishing rate)
is the intelligent presence and communication of the physical objects or things around us
with themselves (M2M) and/or with humans (M2H). Emergence of such a kind of per-
vasive inter-networking ecosystem has enormous scope in terms of market growth and
applications which have (to some extent) and will prove with greater force its efficacy to
improve quality of life. Though it is bit early to precisely define the depth of coverage and
the long-term impact of IoT applications, nevertheless particularly in domains like health-
care, agriculture, city and home/office automation, industrial and energy management, etc.
the immediate applications of IoT are easily conceivable. For realization and rapid devel-
opment of such IoT applications, formal establishment of IoT architecture and standard-
ization of related protocol suites are vital as they ensure co-existence and co-operation of
cross-vendor devices as well as applications. Nevertheless, as with any other hyped research
area, IoT has also become victim of its own success and hitherto no one architecture is
globally accepted with a common consensus.
In the midst of this, this chapter intends to introduce IoT in a pedagogical manner to the
readers. More specifically, the chapter guides the reader through the evolution of IoT, dis-
cusses the pertinent taxonomy and proposed architectures, probes the various efforts for
standardization of IoT and illustrates some of the popular applications of IoT. While dealing
with promising IoT applications, the chapter presents a comprehensive view comprised of
the constituent components and major stakeholders to fit-in, characteristics and key factors
to focus, enabling technologies to leverage and categorize each application to understand
the various viewpoints.
1.1 Introduction
The evolution towards 5G is widely characterized by exponential growth in the number
of computing devices embedded in everyday objects and interconnected over the
Internet. Over 50 billion devices are expected on the cellular networks by the year 2020,
compared to 12.5 billion devices in 2010 [41] and about 28 billion devices estimated in
2017 [6]. This massive interconnection of proliferating heterogeneous physical objects
is technically termed as the Internet of Things (IoT). Such a kind of networking ecosys-
tem enables communication-capable resource-constrained heterogeneous objects
or devices to be connected over the Internet, in addition to the interconnections of
computationally resourceful devices like computers, smartphones, PDA, etc. Thus, IoT
renders the entire Internet space as the working area for such devices. In other words,
the IoT paradigm begins to facilitate devices to acquire smartness by performing all
sorts of operations (monitor, exchange, process, compute, make decisions indigenously
or collaboratively) and accordingly take the required actions, based on the information
being sensed anywhere across the globe. IoT system is poised to generate a significant
surge in demand for data, computing resources, as well as networking infrastructures
in order to accommodate these myriads of interconnected devices. Meeting these
stringent demands necessitates appropriate improvisations to existing network infras-
tructures as well as computing technologies; one of such alterations is Multi-Access
Edge Computing (MEC) formerly know as Mobile Edge Computing [55]. Analogically,
IoT can be viewed as the sensory and nervous system of the future Information and
Communication Technology (ICT) whereas the brain’s inherent capabilities to store,
process and take decisions would be furnished by technologies like cloud computing,
mobile edge computing, parallel computing as well as the sciences of big data ana-
lytics, artificial intelligence, machine learning, etc. Ensuring synergy between these
technologies is the key to success.
as Social Internet of Things (SIoT) aims to interconnect the IoT to human social net-
works [33]. SIoT explains how the objects are capable of establishing social relationships
in an autonomous way with respect to their owners. Another prominent facet of IoT is
Industrial Internet of Things (IIoT) which intends to transform the entire existing indus-
trial manufacturing and maintenance system to a smart enterprise automation system
provisioned with higher levels of intelligence and cognitive computing. It is realized
by securely interconnecting industrial assets over the Internet and leveraging relevant
technologies (for e.g. cloud computing) which leads to precise supervision in industrial
environments and an increase in the return on investment.
Application Layer
Network Layer
Perception Layer
Business Layer
Application Layer
Middleware Layer
Network Layer
Perception Layer
Application
IoT
IoT Process Virtual
Service
Management Entity
Organization
Service
Management
Security
Communication
Device
Header Size
Organization
Response
Subscribe
Transport
Request/
RESTful
Security
Publish/
(Byte)
QoS
Applications protocols
Characteristics
Network layer & middlewear protocols
Functionality
Organization
Zero configuration. Uses IP multicast UDP packets.Run with no or less
mDNS Service discovery IETF
infrastructure
DNS-SD Service discovery Utilizes mDNS. Zero configuration. Wide area service discovery by clients. IETF
RPL Routing Distance vector protocol. DODAG topology. IETF
6LoWPAN Encapsulation Adaptation layer for IPv6 . Header compression. Fragmentation. IETF
6TiSCH Encapsulation Low-power operations for IPv6 over IEEE802.15.4e TSCH mode. Industrial IoT. IETF
Organization
MAC Access
Radio Band
Technique
Scalability
Spreading
Data Rate
Range
(MHz)
(bps)
TDMA, CSMA/
IEEE 802.15.4 DSSS 868/915/2400 20/40/250K 65K nodes IEEE 10 m-100m
CA
Physical layer protocols
BLE FHSS 2400 TDMA 1024K 5971slaves Bluetooth group < 100m
EPCglobal DS-CDMA 860~960 ALOHA Varies5~640K - EPCglobal < 50 m
1G (up), 500M
LTE-A Multiple CC varies OFDMA - 3GPP < 100km
(down)
30 m (Indoor) &
Z-Wave - 868/908/2400 CSMA/CA 40K 232nodes Sigma Designs
100m (Outdoor)
LoRa Unslotted
LoRa 0.125-0.25 0.3K to 50K Upto millions LoRa Alliance < 15 km
(CSS) ALOHA
30 km – 50 km
Unslotted
Sigfox BPSK 0.1 100or 600 Upto millions SNO (Rural) & 10 km
ALOHA
(Urban)
20K(up)
NB-IoT QPSK 0.18 FDMA/OFDMA 50K 3GPP < 35 km
250K(down)
Insteon - 904 TDMA + simulcas 38.4k 256 Smartlabs < 45 m
defined for sensor networks and is tailored to adapt to the peculiarities (and dynamics)
of the wireless communication environment [77]. Extensible Messaging and Presence
Protocol (XMPP) was designed originally for chatting and message exchange applica-
tions and later was reused in both IoT and SDN (Software Defined Networking) [72].
Advanced Message Queuing Protocol (AMQP) is an open standard application layer
protocol for IoT and supports message-oriented environments [10]. Some of the
key features of AMQP include message orientation, queuing, routing (including
point-to-point and publish-and-subscribe), reliability and security. OMG introduces
another publish/subscribe protocol, named as Data Distribution Service (DDS), which
suits IoT and M2M communication due to the excellent Quality-of-Service (QoS) levels
and the broker less architecture that guarantees reliability [17].
Introduction to IoT 9
Due to the high scalability of IoT, it requires a standard Domain Name Sys-
tem (DNS) type resource management mechanism to register and discover resources
in a self-configured, efficient, and dynamic way. Multicast DND (mDNS) and DNS
Service Discovery (DNS-SD) can browse the network for discovering resources and
services offered by IoT devices [38, 71]. IETF has designed RPL as a link-independent
distance-vector routing protocol which is based on IPv6 for resource-constrained
nodes [83]. In RPL the nodes construct a Destination Oriented Directed Acyclic graph
(DODAG) by exchanging distance vectors and root with a controller. The 6LowPAN
protocol is an adaptation layer allowing to transport IPv6 packets over IEEE 802.15.4
networks with a maximum packet size of 127 bytes [62]. The standard provides
compression of IPv6 and UDP/ICMP headers and fragmentation for reassembling of
IPv6 packets. A new working croup called 6TiSCH is recently developed by IETF for
standardizing IPv6 to pass through Time-Slotted Channel Hopping (TSCH) mode of
IEEE 802.15.4e datalinks [40].
The IEEE 802.15.4 protocol specifies a sub-layer for Medium Access Control (MAC)
and physical (PHY). It defines a frame format and headers (including source and
destination addresses) and also explains how nodes can communicate with each
other [9]. This standard is used by IoT, M2M and WSN due its salient features which
are the low-power consumption, low data rate, low cost, interoperability, reliable
communication and high message throughput. Bluetooth Low-Energy (BLE) is another
good candidate for IoT applications as it offers wider range, lower latency, and minimal
amount of power over the classic Bluetooth [19]. RFID technology uses Electronic
Product Code (EPC) unique identification numbers while EPCGlobal has become a
universal standard [84]. Long-Term Evolution Advanced (LTE-A) is a scalable and
lower-cost protocol which fits well for M2M communication and IoT applications in
cellular networks [14, 47]. Z-Wave is yet another low-power protocol which is originally
designed for automation networks in smart home applications and later was developed
for small commercial domains [7].
In addition to those standards that define the operational framework of IoT, there
exist many other protocols for security, interoperability and management purposes.
Since the conventional security protocols on the Internet are not always compatible
with the resource-constrained IoT devices, the customized protocols have been defined
(e.g., IPsec [49], Datagram Transport Layer Security (DTLS) [70], Host Identity Proto-
col Diet-exchange (HIP-DEX) [61]). Furthermore, some other management protocols
are available such as IEEE 1905.1 [12] for interoperability, Long Range Wide-Area Net-
work (LoRaWAN) [4], Wireless Smart Ubiquitous Network (Wi-SUN) [1], Narrow Band
IoT (NB-IoT), Sigfox and Zigbee [11] for low-power wide area networks (LPWANs). The
unlicensed spectrum for LPWAN, LoRa radio, defines Physical and Data Link layers of
LPWANs whereas LoRaWAN is analogous to Network and Transport layers of OSI com-
munication stack. LoRaWAN is an open network protocol that manages communication
between gateways and end-devices [4].
According to the latest forecast report [22] from Rethink research, most of the growth
of LPWAN technologies will be supported by NB-IoT, LTE-M and Wi-SUN from 2017
to 2023 period. Moreover, they anticipate that LoRa and Sigfox respectively have slightly
increasing and constant growth rates during the next seven years.
10 IoT Security: Advances in Authentication
Smart Home/City
Industrial
Smart Energy
Internet
Agriculture Healthcare
IoT Automotive
Wearables
IoT Application Categories as per [44] Categories as per [20] Categories as per [56]
Based on the received aggregated data, collaborative-aware services take decisions and
accordingly the responses/actions are coordinated to the point of actuation. Finally,
the Ubiquitous services ensure the network-wide pervasive presence and anytime
availability of underlying collaborative-aware services. IoT applications, when designed
to rise up to the level of ubiquitous services, will yield maximum benefit, however, it
requires smooth integration of technologies, protocols and standards.
Among the wide range of IoT use cases, the market is heading towards two key cat-
egorized areas namely massive IoT and mission critical IoT [20]. In massive IoT, large
numbers of low-cost low-powered devices typically emit a low volume of non-delay
sensitive data. The devices need to report to the cloud on a regular basis and therefore
require seamless connectivity and good coverage. The application areas of massive IoT
comprise smart home, smart agriculture, asset management and smart metering. By
contrast, the critical IoT applications have very high demands of reliability, availability,
and low latency.
Based on the scope of the usage and adaptation, IoT applications are categorized into
four levels of applications [56]; infrastructural level, organizational level, individual
level and all-inclusive level. At infrastructural level, applications like smart city, smart
energy, smart tourism etc. are placed where they have potential, in turn, to create the
next level of the ecosystem. Industrial Internet, smart agriculture, retail etc. come
under organizational level since such applications aim to automate the working of an
organization. Quite obviously, the applications that fall under the category of individual
level are smart home, gaming, wearable etc. However, there are few applications that
have wider scope and can span through all the levels such as medical and healthcare,
automotive, education etc.
Table 1.1 exhibits one-way of categorizing different IoT applications whereas Table 1.2
reveals the characteristics of those IoT applications.
Table 1.2 Characteristics of Different IoT application [5, 8, 23, 64, 66].
short, fully automate the home environment comprising household devices and home
appliances while minimizing human effort. IoT vision intrinsically promises to furnish
the much needed underpinning ecosystem that supports the easy accomplishment of
smart home application.
IoT-based smart home makes use of both local (but limited) storage and processing
units (example gateway or hub) as well as cloud infrastructure [78, 88]. With aug-
mentation of edge computing performance is expected to be improved significantly as
the operations are not computational intensive. Apparently, the achieved gain would
be in terms of latency, load balancing, traffic reduction and progressive-resource
utilization.
Smart home is sometimes seen as an extension of smart grid concept [78]. From that
perspective, the primary intent of smart home is to optimize the energy consumption
taking into account various inputs like usage pattern and real-time presence of resi-
dents, the external environment (e.g. weather condition), time of the day, balance units
of pre-paid electricity account etc.
Prominent stakeholders of smart home are shown in the figure 1.7. In addition, the
major components constituting the smart home application are smart security & surveil-
lance systems, smart HVAC (Heating, Ventilation and Air Conditioning), self-adjustable
and smart customization of the environment based on the user’s profile, smart energy
management and smart object traceability via IoT powered GIS. The key factors i.e. chal-
lenges pertinent to the smart home are high privacy and security, high reliability, high
interoperability, strong adaptation to multipath error prone wireless environment etc.
Various contending technologies and standards for IoT driven smart home are ZigBee,
6LoWPAN, low power WiFi, BLE, RFID, Insteon, cloud computing etc.
Undoubtedly, full-flexed realization of IoT enabled smart home application has enor-
mous potential to enhance the experience of personal living.
Introduction to IoT 13
Smart Home
Control Apps
Cloud
Utility Providers
Smart Smart
Smart Smart
Society Mobility
Industry Infrastructure
Wind
Plants Thermal
Hydro Power
Plants Nuclear
Plants
Solar Plants
Plants
1.4.4 Healthcare
IoT driven healthcare applications are envisioned to roll-out in a massive way and it
is envisioned to capture the biggest chunk of the future IoT market by 2025 [29]. IoT
has built-in capabilities to support well all sorts of medical healthcare; preventive, diag-
nostic, therapeutic and rehabilitation healthcare [36]. Interestingly, on one side, the
healthcare sector demands IoT paradigm to bestow living beings with solutions that can
monitor various physiological parameters, detect symptoms and thereby (early) diag-
nose, suggest preventive measures, and progressively adapt treatment based on AI and
ML approaches. On the other side, medical IoT can guide pharmaceutical companies to
develop and design new medicines based on data analytics of IoT generated big data of
recent patients and take further appropriate measures when required.
Figure 1.10 gives a glimpse into the role of IoT in the healthcare domain. Various
entities which can directly or indirectly benefit from healthcare application of IoT
are patients, doctors, supporting staff (i.e. nurse and technicians), hospitals, medical
insurance companies and pharmaceutical industries. Medical IoT devices such as smart
watch, bands, shoes, clothes, etc. can sense and communicate in real-time the vital signs
of an admitted patient remotely to a doctor who, if required, can instruct the attending
nurse to take action on an urgent basis. One can imagine numerous major components
of IoT healthcare applications, some of them are smart remote health monitoring,
smart asset management for hospitals, smart medical inventory optimization based on
Wearable
Emergency
Response
Patients
Telemedicine
Nurses
Doctors
Medical Lab
Robots Technicians
Smart
Hospitals
Education
Military
Video
Games
Retail
Real
States
Healthcare
Engineering
Video Entertainments
Live Events
1.4.7 Retail
Among others, retail is yet another captivating area that aspires to harness the capa-
bilities of IoT. Entire new sets of real-time services can be introduced that at one end
enhances the customer experience to the next level and on the other hand alleviates the
way the retail sector (i.e. business-to-consumers (B2C)) is managed and maintained.
Major components of retail applications of IoT are smart supply chain and logistics,
18 IoT Security: Advances in Authentication
smart finance management and intelligent prediction, smart real-time customer assis-
tance while purchasing, smart complainy management system, smart post-purchase
relations and feedback system.
The distinctive factors to bear in mind while developing IoT-based retail solutions
are aesthetic presence, customer friendliness, context awareness and high QoE of cus-
tomers [34].
1.4.8 Wearable
By now it is difficult to deny the fact that Wearable IoT (WIoT) devices and gadgets
are closely interwoven in our present life style. Ranging from trendy devices like fitness
tracker and smart watches, to fancy smart attire and essential medical devices, wearable
IoT devices have hit the market in a big way. They are projected to capture the mar-
ket drastically and will stand just next to smartphones in consumer electronics [79].
Major components of WIoT are smart tracking, smart infotainment, smart clothing,
smart assistance, smart medical monitoring and personal security alarms, etc.
Some of the key factors to take into account while designing and developing WIoT
(devices, protocols, applications etc.) are ultra-high safety, ultra-low power consump-
tion, high level of comfort to the human body, highly user-friendly, low latency, high
context awareness, high privacy and high bandwidth.
The very first telesurgical operation was carried out as early as 2001 [57]. However,
telesurgery is still not in the mainstream due to the technical limitations, especially
in underlying communication networks. With the characteristics of tactile Internet,
telesurgery types of procedure are realistic [86]. In industrial environments, Tactile
Internet can be used for remote mining in high-risk areas, efficient manufacturing of
highly customized products and remote inspection, maintenance and repair [42].
1.4.12 Conclusion
The chapter presents a lucid and compact summary of the IoT world and several perti-
nent facets of IoT, especially, the plethora of exciting IoT applications that open doors to
a new world of services and users’ experience. The IoT vision embraces the existence of
all sorts of resource-constrained communication-capable targeted or generic purpose
heterogeneous smart objects. Thus, in addition to the search for new technologies, IoT
has apparently revived numerous forgotten technologies and has also effectuated the
resurgence of research activities in these respective domains.
For IoT to transform into a profitable venture and find its fully flexed pragmatic real-
ization, numerous factors have been discussed specific to each diversified application.
In essence, IoT’s global acceptance primarily depends on a few key factors like reliability
with the bounded response time, economic and incremental approach which takes
into account existing infrastructure thereby incentivizing the stakeholders, seamless
integration over heterogeneity in terms of objects, technologies, protocols, platforms,
applications, etc., scalability in terms of enormous objects distributed over a fleet of
locations to be connected over the Internet, availability supporting infrastructure to
gather, exchange and process big data, and finally ability to draw intelligent conclusions
by performing data mining, data analytics, machine learning which in-turn helps with
decision making.
Acknowledgement
This work is supported by European Union RESPONSE 5G (Grant No: 789658) and
Academy of Finland 6Genesis Flagship (grant no. 318927) projects.
References
1 WiSun Alliance (2017). Comparing IoT Networks at a Glance: How Wi-SUN com-
pares with LoRaWAN and NB-IoT. WiSUN technical White paper. www.wi-sun.org/
wp-content/uploads/Wi-SUN-Comparing-IoT-Networks.pdf (accessed 16 July 2019).
2 EU Fp7 ASPIRE project. https://aspire-fp7.eu/ (accessed 16 July 2019).
3 EU FP7 iCore project. http://www.coreproject.eu (accessed 16 July 2019).
4 LoRAWAN specifications, LoRa Alliance Technology. https://lora-alliance.org/
resource-hub/lorawanr-specification-v11 (accessed 16 July 2019).
5 Chadwick, S. (2018) Putting Sensors to Work in the Factory Environment: Data to
Information to Wisdom. https://itpeernetwork.intel.com/putting-sensors-to-work-in-
factory-environment/#gs.q2drfl (accessed 16 July 2019).
Introduction to IoT 21
6 Sage Business Researchermore than 28 billion devices connect via internet of things.
http://businessresearcher.sagepub.com/sbr-1863-102197-2772812/20170306/more-
than-28-billion-devices-connect-via-internet-of-things. (accessed 17 July 2019).
7 Smart Home products with Z-Ware. Z-wave Technology. https://www.z-wave.com/
(accessed 16 July 2019).
8 GSMA. (2016) Unlocking Commercial Opportunities From 4G Evolution to 5G.
GSMA Network Technical Report. https://www.gsma.com/futurenetworks/wp-
content/uploads/2017/03/704_GSMA_unlocking_comm_opp_report_v5.pdf (accessed
16 July 2019).
9 IEEE. (2012). IEEE standard for local and metropolitan area networks-part 15.4:
Low-rate wireless personal area networks (lr-wpans) amendment 1: Mac sublayer.
IEEE Std 02.15.4e-2012 (Amendment to IEEE Std 802.15.4-2011), 1–225.
10 OASIS. (2012). OASIS Advanced Message Queuing Protocol (AMQP) Version
1.0. OASIS Standard. http://docs.oasis-open.org/amqp/core/v1.0/os/amqp-core-
overview-v1.0-os.html (accessed 16 July 2019).
11 Zigbee Alliance. (2012). ZigBee Specification. 1–622. ZigBee Alliance. http://www
.zigbee.org/wp-content/uploads/2014/11/docs-05-3474-20-0csg-zigbee-specification
.pdf (accessed 16 July 2019).
12 IEEE. (2013). 1905.1-2013 –IEEE Standard for a Convergent Digital Home Network
for Heterogeneous Technologies. IEEE Standard.
13 Bauer, M., Boussard M., Bui, N. et al. (2013). Deliverable D1.5 Final architectural
reference model for the IoT v3.0. IoT-A Consortium. https://www.researchgate
.net/publication/272814818_Internet_of_Things_-_Architecture_IoT-A_Deliverable_
D15_-_Final_architectural_reference_model_for_the_IoT_v30 (accessed 16 July 2019).
14 Wannstrom, J. (2013). LTE-Advanced Specifications. 3GPP Org. https://www.3gpp
.org/technologies/keywords-acronyms/97-lte-advanced (accessed 16 July 2019).
15 OASIS. (2014). MQTT v3.1.1. OASIS Standard. https://mqtt.org/ (accessed 16 July
2019).
16 ITU-T. (2014). The tactile internet. ITU-T Technology Watch Report. https://www
.itu.int/dms_pub/itu-t/oth/23/01/T23010000230001PDFE.pdf (accessed 16 July 2019).
17 OMG. (2015). Data Distribution Service (DDS) Specification Version 1.4. OMG Stan-
dard. https://www.omg.org/spec/DDS/About-DDS/ (accessed 16 July 2019).
18 Platform Industrie. (2015). Reference Architecture Model Industrie 4.0 (RAMI 4.0).
Platform Industrie. https://www.plattform-i40.de/PI40/Redaktion/EN/Downloads/
Publikation/rami40-an-introduction.pdf?__blob (accessed 16 July 2019).
19 Bluetooth SIG Working Group. (2019). Bluetooth Core Specification Version
5.1. Bluetooth SIG. https://www.bluetooth.com/specifications/bluetooth-core-
specification/ (accessed 16 July 2019).
20 Ericsson Working Group. (2016). Cellular Networks for Massive IoT. Ericsson White
Paper. https://www.ericsson.com/en/white-papers/cellular-networks-for-massive-iot&
ndash;enabling-low-power-wide-area-applications (accessed 16 July 2019).
21 Automotive Sensors and Electronics Expo, 2017. Detroit, USA (14–15 June 2017).
22 Rethink Technology Research (2017). LPWAN Revenue Forecast, 2017 to 2023.
Rethink Technology Research. https://rethinkresearch.biz/report/lpwan-market-
forecast-2017-2023/ (accessed 16 July 2019).
23 iGillot Research. (2017). The Business Case for MEC in Retail: A TCO Analysis and
its Implications in the 5G Era. Intel technical White Paper, IGR. https://www.intel
22 IoT Security: Advances in Authentication
.com/content/www/us/en/communications/multi-access-edge-computing-brief.html
(accessed 16 July 2019).
24 Shin, S.-W., Crawford, M., and Mellor, S. (eds) (2017). The Industrial Internet of
Things Volume G1: Reference Architecture. 1–58. Industrial Internet Consortium
(IIC). https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf (accessed
16 July 2019).
25 Employment in agriculture (% of total employment) (modeled ILO estimate).
The World Bank, (2018). https://data.worldbank.org/indicator/SL.AGR.EMPL.ZS
(accessed 16 July 2019).
26 IoT in the Automotive Industry. Tata Communications (2018). https://
www.tatacommunications.com/wp-content/uploads/2018/02/IOT-IN-THE-
AUTOMOTIVE-INDUSTRY.pdf (accessed 16 July 2019).
27 Adapa, S. (2018). Indian smart cities and cleaner production initiatives–integrated
framework and recommendations. Journal of Cleaner Production 172: 3351–3366.
28 Aijaz, A., Dohler, M., Aghvami, A.H., et al. (2017). Realizing the tactile internet:
Haptic communications over next generation 5g cellular networks. IEEE Wireless
Communications 24 (2): 82–89.
29 Al-Fuqaha, A., Guizani, A.M., Mohammadi, M. et al. (2015). Internet of things:
A survey on enabling technologies, protocols, and applications. IEEE Communica-
tions Surveys Tutorials 17 (4): 2347–2376.
30 Alavi, A.H., Jiao, P., Buttlar, W.G. and Lajnef, N. (2018). Internet of things-enabled
smart cities: State-of-the-art and future trends. Measurement 129: 589–606.
31 Atzori, L., Iera, A. and Morabito, G. (2010). The internet of things: A survey. Com-
puter Networks 54 (15): 2787–2805.
32 Atzori, L., Iera, A. and Morabito, G. (2017). Understanding the internet of things:
definition, potentials, and societal role of a fast-evolving paradigm. Ad Hoc Networks
56: 122–140.
33 Atzori, L., Iera, A., Morabito, G. and Nitti, N. (2012). The social internet of things
(SIoT): When social networks meet the Internet of Things: Concept, architecture
and network characterization. Computer Networks 56 (16): 3594–3608.
34 Balaji, M. and Roy, S.K. (2017). Value co-creation with internet of things technology
in the retail industry. Journal of Marketing Management 33 (1–2): 7–31.
35 Boyes, H., Hallaq, B., Cunningham, J. and Watson, T. (2018). The industrial internet
of things (IIoT): An analysis framework. Computers in Industry 101: 1–12.
36 Brucher, L. and Moujahid, S. (2017). The Internet-of-Things A revolutionary digital
tool for the healthcare industry. Deloitte. https://www2.deloitte.com/content/dam/
Deloitte/lu/Documents/life-sciences-health-care/lu_digital-tool-healthcare-industry_
062017.pdf (accessed 16 July 2019).
37 Carrez, F., Elsaleh, T., Gomez, D. et al. (2017). A reference architecture for federating
IoT infrastructures supporting semantic interoperability. Networks and Communica-
tions (EuCNC), Oulu, Finland (12–15 June 2017). IEEE.
38 Cheshire, S. and Krochmal, M. (2013). DNS-Based Service Discovery. IETF RFC
6763. https://tools.ietf.org/html/rfc6763 (accessed 16 July 2019).
39 Coogan, C.G. and He, B. (2018). Brain-computer interface control in a virtual reality
environment and applications for the internet of things. IEEE Access 6: 10840–10849.
Introduction to IoT 23
40 Dujovne, D., Watteyne, T., Vilajosana, X. and Thubert, P. (2014). 6tisch: deterministic
IP-enabled industrial Internet (of Things). IEEE Communications Magazine 52 (12):
36–41.
41 Evans, D. (2011). The internet of things: How the next evolution of the internet is
changing everything. CISCO white paper 1 (2011): 1–11.
42 Fettweis, G.P. (2014). The tactile internet: Applications and challenges. IEEE Vehicu-
lar Technology Magazine 9 (1): 64–70.
43 Gazis, V. (2017). A survey of standards for machine-to-machine and the internet of
things. IEEE Communications Surveys Tutorials 19 (1): 482–511.
44 Gigli, M. and Koo, S.G. (2011). Internet of things: Services and applications catego-
rization. Advanced Internet of Things 1 (2): 27–31.
45 Guillemin, P. and Friess, P. (2009). The Industrial Internet of Things Volume G1: Ref-
erence Architecture. The Cluster of European Research Projects, Technical Report.
46 Gurtov, A., Liyanage, M. and Korzun, D. (2016). Secure communication and data
processing challenges in the industrial internet. Baltic Journal of Modern Computing
4 (4): 1058–1073.
47 Hasan, M., Hossain, E. and Niyato D. (2013). Random access for
machine-to-machine communication in LTE-advanced networks: issues and
approaches. IEEE Communications Magazine 51 (6): 86–93.
48 Kae, V.P., Fukushima Y. and Harai, H. (2016). Internet of things standardization ITU
and prospective networking technologies. IEEE Communications Magazine 54 (9):
43–49.
49 Kent, S. and Seo, K. (2005). Security Architecture for the Internet Protocol. IETF
RFC 4301.
50 Khan, R., Khan, S.U., Zaheer, R. and Khan, S. (2012). Future internet: The internet
of things architecture, possible applications and key challenges. 2012 10th Interna-
tional Conference on Frontiers of Information Technology, Islamabad, Pakistan (17–19
December 2012). IEEE.
51 Kong, L., Khan, M.K., Wu, F. et al. (2017). Millimeter-wave wireless communications
for IoT-cloud supported autonomous vehicles: Overview, design, and challenges.
IEEE Communications Magazine 55 (1): 62–68.
52 Kumar, T., Braeken, A., Liyanage, M. and Ylianttila, M. (2017). Identity privacy pre-
serving biometric based authentication scheme for naked healthcare environment.
2017 IEEE International Conference on Communications (ICC), Paris, France (21–25
May 2017). IEEE.
53 Lin, J., Yu, W., Zhang, N. et al. (2017). A survey on internet of things: Architecture,
enabling technologies, security and privacy, and applications. IEEE Internet of Things
Journal (99): 1–1.
54 Litman, T. (2017). Autonomous vehicle implementation predictions. Victoria Trans-
port Policy Institute Victoria, Canada.
55 Liyanage, M., Ahmad, I., Abro, A.B. et al. (2018). A Comprehensive Guide to 5G
Security. New York: John Wiley & Sons.
56 Lu, Y., Papagiannidis, S. and Alamanos, E. (2018). Internet of things: A systematic
review of the business literature from the user and organisational perspectives.
Technological Forecasting and Social Change 136: 285–297.
57 Marescaux, J., Leroy, J., Gagner, M. et al. (2001). Transatlantic robot-assisted
telesurgery. Nature 413 (6854): 379.
24 IoT Security: Advances in Authentication
58 Miorandi, D., Sicari S., Pellegrini, F.D. and Chlamtac, I. (2012). Internet of things:
Vision, applications and research challenges. Ad Hoc Networks 10 (7): 1497–1516.
59 Munster, G. and Bohlig, A. (2017). Auto Outlook 2040: The Rise of Fully
Autonomous Vehicles. Loupventures. https://loupventures.com/auto-outlook-2040-
the-rise-of-fully-autonomous-vehicles/ (accessed 16 July 2019).
60 Nacke, L.E. and Deterding, C.S. (2017). The maturing of gamification research. Com-
puters in Human Behaviour 450–454.
61 Nie, P., Vähä-Herttua, J., Aura, T. and Gurtov, A. (2011). Performance analysis of
HIP diet exchange for WSN security establishment. 51–56. ACM.
62 Thubert, P. (2011). Compression Format for IPv6 Datagrams over IEEE
802.15.4-Based Networks. IETF RFC 6282.
63 Perera, C., Zaslavsky, A., Christen, P. and Georgakopoulos, G. (2014). Context aware
computing for the Internet of Things: A survey. IEEE Communications Surveys Tuto-
rials 16 (1): 414–454.
64 Perez, M., Xu, S., Chauhan, S. et al. (2016). Impact of Delay on Telesurgical Per-
formance: Study on the Robotic Simulator dV-Trainer. International Journal of
Computer Assisted Radiology and Surgery 11 (4): 581–587.
65 Porambage, P., Manzoor, A., Liyanage, M., et al. (2019). Managing mobile relays for
secure e2e connectivity of low-power IoT devices. IEEE Consumer Communications &
Networking Conference, 2019, Las Vegas, USA (11–14 January 2019). IEEE.
66 Porambage, P., Okwuibe, J., Liyanage, M. et al. (2018). Survey on multi-access edge
computing for internet of things realization. IEEE Communications Surveys & Tuto-
rials 20 (4): 2961–2991.
67 Rajakaruna, A., Manzoor, A., Porambage, P. et al. (2018). Lightweight dew comput-
ing paradigm to manage heterogeneous wireless sensor networks with UAVs. arXiv
preprint arXiv:1811.04283. https://arxiv.org/pdf/1811.04283.pdf (accessed 16 July
2019).
68 Ramamurthy, A. and Jain, P. (2017). The internet of things in the power sector
opportunities in Asia and the Pacific. Asian Development Bank https://www.adb.org/
publications/internet-of-things-power-sector-opportunities (accessed 25 June 2019).
69 Reka, S.S. and Dragicevic, T. (2018). Future effectual role of energy delivery: A com-
prehensive review of internet of things and smart grid. Renewable and Sustainable
Energy Reviews 91: 90–108.
70 Rescorla, E. and Modadugu, N. (2012). Datagram Transport Layer Security Version
1.2. IETF RFC 6347.
71 Cheshire, S. and Krochmal, M. (2013). Multicast DNS. IETF RFC 6762.
72 Saint-Andre, P. (2011). Extensible Messaging and Presence Protocol (XMPP): Core.
IETF RFC 6120.
73 Sanchez, L., Muñoz, L., Galache, J.A. et al. (2014). Smartsantander: Iot experimenta-
tion over a smart city testbed. Computer Networks 61: 217–238.
74 Shelby, Z., Hartke, K., and Bormann, C. (2014). The Constrained Application Proto-
col (CoAP). IETF RFC 7552.
75 Sheng Z., Yang, S., Yu, Y. et al. (2013). A survey on the ietf protocol suite for the
internet of things: standards, challenges, and opportunities. IEEE Wireless Communi-
cations 20 (6): 91–98.
Introduction to IoT 25
Abstract
In a world with “things” and devices interconnected at every level, from wearables to home
and building automation, to smart cities and infrastructure, to smart industries, and to
smart-everything, the Internet of Things (IoT) security plays a central role with no mar-
gin for error or shortage on supply. Securing, including authentication of these devices,
will become everyone’s priority, from manufacturers to silicon vendors (or IP developers),
to software and application developers, and to the final consumer, the beneficiaries of the
security “recipe” that will accompany these IoT products. Together, all consumers of these
products need to adapt to the market demands, innovate, and improve processes, grasp
new skills and learn new methods, raise awareness and embrace new training and curricula
programs.
In this chapter, we provide a thorough survey and classification of the existing vulner-
abilities, exploitable attacks, possible countermeasures as well as access control mecha-
nisms including authentication and authorization. These challenges are addressed in detail
considering both the technologies and the architecture used. Furthermore, this work also
focuses on IoT intrinsic vulnerabilities as well as the security challenges at every layer. In
addition, solutions for remediation of the compromised security, as well as methods for risk
mitigation, with prevention and suggestions for improvement are discussed.
2.1 Introduction
The rapid proliferation of the Internet of Things (IoT) into diverse application areas such
as building and home automation, smart transportation systems, wearable technologies
for healthcare, industrial process control, and infrastructure monitoring and control is
changing the fundamental way in which the physical world is perceived and managed.
It is estimated that there will be approximately 30 billion IoT devices by 2020. Most of
these IoT devices are expected to be of low-cost and wireless communication technology
based, with limited capabilities in terms of computation and storage. As IoT systems are
increasingly being entrusted with sensing and managing highly complex eco-systems,
questions about the security and reliability of the data being transmitted to and from
these IoT devices are rapidly becoming a major concern.
It has been reported in several studies that IoT networks are facing several security
challenges [1–7] including authentication, authorization, information leakage, privacy,
verification, tampering, jamming, eavesdropping, etc. IoT provides a network infras-
tructure with interoperable communication protocols and software tools to enable the
connectivity to the internet for handheld smart devices (smart phones, personal digital
assistants [PDAs] and tablets), smart household apparatus (smart TV, AC, intelligent
lighting systems, smart fridge, etc.), automobiles, and sensory acquisition systems [1].
However, the improved connectivity and accessibility of devices present major security
concerns for all the parties connected to the network regardless of whether they are
humans or machines. The infiltration launched by the Mirai malware on the Domain
Name System (DNS) provider Dyn in 2016 through a botnet-based Distributed Denial
of Service (DDoS) attack to compromise IoT devices such as printers, IP cameras,
residential gateways, and baby monitors represents the fertile ground for cyber
threats in the IoT domain [82]. Moreover, the cyber-attack launched at the Ukrainian
power grid in 2015 targeting the Supervisory Control and Data Acquisition (SCADA)
system caused a blackout for several hours and is a prime example of the gravity of
resulting devastation possible through modern day attacks [2]. The main reasons for
the security challenges of current information-centric automated systems is their
insecure unlimited connectivity with the internet and the non-existent access control
mechanisms for providing secure and trustworthy communication. Furthermore, the
problem of vulnerabilities in IoT systems arises because of the physical limitations
of resource-constrained IoT devices (in terms of computing power, on-board storage
and battery-life), lack of consensus/standardization in security protocols for IoT, and
widespread use of third-party hardware, firmware, and software. These systems are
often not sufficiently secure; especially when deployed in environments that cannot be
secured/isolated by other means. The resource constraints on typical IoT devices make
it impractical to use very complex and time-consuming encryption/decryption algo-
rithms for secure message communication. This makes IoT systems highly susceptible to
various types of attacks [1, 3–7]. Furthermore, addressing the security vulnerabilities in
the protocols designed for communication is critical to the success of IoT [8–12, 97, 98].
This chapter focuses on security threats, attacks, and authentication in the context
of the IoT and the state-of-the-art IoT security. It presents the results of an exhaustive
survey of security attacks and access control mechanisms including authentication and
authorization issues existing in IoT systems, its enabling technologies and protocols,
while addressing all levels of the IoT architecture. We surveyed a wide range of existing
works in the area of IoT security that use a number of different techniques. We
classify the IoT security attacks and proposed countermeasures based on the current
security threats, considering all three layers: perception, network, and application.
This study aims to serve as a useful manual of existing security threats and vulnera-
bilities within the IoT heterogeneous environment and proposes possible solutions
for improving the IoT security architecture. State-of-the-art IoT security threats
and vulnerabilities have also been investigated, in terms of application deployments
such as smart utilities, consumer wearables, intelligent transportation, smart agri-
culture, industrial IoT, and smart city have been studied. The insights presented on
Introduction to IoT Security 29
authentication and authorization aspects for the comprehensive IoT architecture are
the prime contributions of this chapter.
The remainder of this chapter is organized as follows. Section 2.2 provides the IoT
classification of attacks and their countermeasures according to the IoT applications
and different layers of the IoT infrastructure. Section 2.3 addresses the importance of
authentication with respect to security in IoT and presents in detail the existing authen-
tication and authorization issues at all layers. Section 2.4 introduces other security
features and their related issues. Additionally, solutions for remediation of the compro-
mised security, as well as methods for risk mitigation, with prevention and suggestions
for improvement discussed in the same section. A discussion on the authentication
mechanisms in the IoT domain, considering the most recent methodologies, has been
presented in Section 2.5. Section 2.6 introduces future research directives such as
blockchain, 5G, fog and edge computing, quantum, AI and network slicing. Finally,
Section 2.7 concludes this study.
1 https://www.tenable.com/products/nessus/nessus-professional
30 IoT Security: Advances in Authentication
Smart Agriculture
Smart Industries
Transportation
Tele Medicine
Application
Smart Home
Smart Grids
Smart City
Intelligent
Layer
Network Layer
Mobile Information
Communication Internet Centric Network
Network Management
Sensor Access
RFID Sensors
Perception
Gateway Gateway
Layer
Intelligent
RFID Tags Sensor Node
Terminals
algorithms and File Transfer Protocol (FTP) inherited by webcams, smart TVs and print-
ers are further identified based on manufacturer models.
In this section, we present the results of our study on the existing vulnerabilities,
exploitable attacks and possible countermeasures in the context of the IoT and the
state-of-the-art IoT security. We surveyed a wide range of existing work in the area of
IoT security that use different techniques. We classified the IoT security attacks and
the proposed countermeasures based on the current security threats, considering all
three layers: Perception, Network, and Application. Figure 2.1 illustrates the typical
architecture of IoT and entities which are considered under each layer. Table 2.1
summarizes the taxonomy of attacks and viable solutions of IoT categorized under each
layer. These attacks and their corresponding solutions will be further discussed below.
Layer/
component Attacks Solutions
a. Perception Layer
Perception Tracking, DoS, repudiation, Access control, data encryption which includes
Nodes spoofing, eavesdropping, data non-linear key algorithms, IPSec protocol
RFID newness, accessibility, utilization, cryptography techniques to protect
self-organization, time against side channel attack [9], [14], Hashed-based
management, secure localization, access control [15], Ciphertext re-encryption to
tractability, robustness, privacy hide communication [16], New lightweight
protection, survivability, and implementation using SHA-3 appointed function
counterfeiting [13]. Keccak-f (200) and Keccak-f (400) [17]
Sensor Node subversion, node failure, Node authentication, Sensor Privacy
nodes node authentication, node outage,
passive information gathering,
false node message corruption,
exhaustion, unfairness, sybil,
jamming, tampering, and
collisions [18, 19]
Sensor Misconfiguration, hacking, signal Message Security, Device Onboard Security,
Gateways lost, DoS, war dialing, protocol Integrations Security [21]
tunneling, man-in-the-middle
attack, interruption, interception,
and modification fabrication [20]
b. Network layer
Mobile Tracking, eavesdropping, DoS, Developing secure access control mechanisms to
Communi- bluesnarfing, bluejacking, mitigate the threats by employing biometrics,
cation bluebugging alteration, corruption, public-key crypto primitives and time changing
and deletion [1], [5], [38] session keys.
Cloud Identity management, Identity privacy – Pseudonym [23–25], group
Computing heterogeneity which is inaccessible signature [24], connection anonymization [26, 30]
to an authentic Location privacy – Pseudonym [23–25], one-way
node, data access controls, system trapdoor permutation [25, 27]
complexity, physical security, Node compromise attack – Secret sharing
encryption, infrastructure security [27–29], game theory [26], population dynamic
and misconfiguration of model [27]
software [22]
Layer removing/adding attack – Packet
transmitting witness [25, 27, 30], aggregated
transmission evidence [27]
Forward and backward security – Cryptographic
one-way hash chain [23, 24]
Semi-trusted/malicious cloud security – (Fully)
homomorphic encryption [31], zero knowledge
proof [32]
Internet Confidentiality, encryption, Identity Management for confidentiality [34],
viruses, cyberbullying, hacking, Encryption schemes for confidentiality of
identity theft, reliability, communication channels [35], Cloud based
integrity, and consent [33] solutions to establish secure channels based on PKI
for data and communication confidentiality [35]
c. Application Data privacy, Tampering Authentication, key agreement and protection of
Layer Privacy, Access control, disclosure user privacy across heterogeneous networks [1],
of information [18] Datagram Transport Layer Security (DTLS) for
end-to-end security [36], Information Flow
Control [28]
32 IoT Security: Advances in Authentication
2.2.1.3 Gateways
Sensory gateways are responsible for checking and recording various properties such
as temperature, humidity, pressure, speed, and functions of distributed sensor nodes.
User access, network expansion, mobility, and collaboration are provided using sensor
gateways.
These channels are also vulnerable to several attacks such as misconfiguration,
hacking, signal lost, DoS, war dialing, protocol tunneling, man-in-the-middle attack,
interruption, interception, and modification fabrication [20]. Moreover, perception
layer devices could be subjected to Side-Channel Attacks (SCA) such as Differential
Power Analysis (DPA), Simple Power Analysis (SPA), timing, and acoustic cryptanalysis
[6]. To ensure security with respect to sensory gateways; message security, device on
board security and integrations security are suitable proposed solutions [21].
Introduction to IoT Security 33
2.2.2.3 Internet
The term Internet stands for the holistic global networking infrastructure which
scopes from private, public, academic, cooperate networks to government networks
[1]. The connectivity through the Internet is formulated by Transmission Control
34 IoT Security: Advances in Authentication
Consumer Intelligent
Smart Utilities Transportation
Wearbles
AMI, Smart Grid e-health, telemedicine ITS, V2V, V2I,
V2P V2G
Smart
Industrial lo T Smart City
Agriculture IIoT, Industry 4.0,
Climate/Livestock Process Smart Environment,
monitoring maintenance, Smart Building
monitoring & Control
attacks are the approaches taken to exploit the procedural nature of the cryptographic
protocols and their mathematical model through extensive analysis. Cryptanalytic
attacks, ciphertext only attacks, known plaintext attacks, and chosen plaintext attacks
exemplify such possible threats [18].
There are several solutions proposed in the literature for the security of IoT appli-
cations such as authentication, key agreement and protection of user privacy across
heterogeneous networks [1], DTLS for end-to-end security [36], and information flow
control [28]. The countermeasures for software-based authentication should be taken
for mitigating attacks such as phishing attacks; through the verification of the identity
of malicious adversaries before proceeding.
Business
Layer
Function
Interoperability
Dimensions
Layer
Information
Layer
Communication
Layer
Component
Layer
Transmission
Market
Distribution
Enterprise
DER
Operation
Domains
Charging Pole Station Zones
2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine
IoT-based healthcare systems are the most profitable and funded projects in the entire
world. This is mainly due to the higher aggregate of aging people and the fact that health
is the most concerning aspect of human life. A sensory system embedded with actuators
is provided for individuals to use as a wearable device (i.e. wearable Internet of Things
[WIoT] device), illustrated in Figure 2.4. A WIoT device can be used for tracking and
recording vitals such as blood pressure, body temperature, heart rate, blood sugar, etc.,
[39]. This data can be conveyed and stored in a cloud as a Personal Health Record (PHR)
to be accessed by the user and the assigned physicians.
Since the data handled in IoT-based healthcare is personal, privacy is the most
demanding security issue. Hence, the access control mechanism for wearable devices
as well as for PHRs must be well secured. However, employing strong crypto primitives
for enhancing the authentication protocols of PHRs is possible as they are also stored
in cloud environments. Hence, the same privacy concerns presented in Section 2.3.2.2
under cloud computing apply. Moreover, a method for assuring anonymity of patients
should be developed in case the PHRs are exposed to external parties, because they
are stored in Cloud Service Providers (CSPs). Wearable devices also face the resource
scarcity issues for battery power, memory, and processing level [39]. Thus, a lightweight
Introduction to IoT Security 37
protocol for authentication and access control should be employed [101]. Similar to all
other IoT applications, heterogeneous wearable devices produced by different manu-
facturers would employ diverse technologies for developing communication protocols.
Thus, developing a generic access control policy would be extremely challenging.
Satellite Aircrafts
Communication
Sea
Vessels
UAV
Trains
Because of the diverse nature of sensor devices used in smart agriculture applications,
integrating them into a holistic system may raise concerns about the compatibility of
technologies among the variety of manufacturers and those protocols in which com-
munication is established. As the plantations or fields are extending to larger areas, the
number of IoT-enabled sensory systems to be deployed will be immense. Handling the
data flow of such a large number of individual sensors with different data representa-
tions dispersed throughout a broad geographical region exerts the requirement for a
communication technology with a higher coverage and moderate data rates which could
not be satisfied by low-range communication technologies such as Bluetooth or NFC.
However, DSRC would be a suitable technology to create a WSN with smart agriculture
sensors, as it is compatible with ITSs.
As the IoT devices are disseminated across a larger geographical extent, the prob-
ability of any IoT device being compromised is high as they are exposed. Perception
level attacks are probable with these devices as they are sensory nodes and would have
limited resources for both processing and storing information. The spoofing, imperson-
ation, replay and Man-in-the-Middle (MiM) attacks are probable with this application
[80]. This raises the requirement for a proper authentication scheme as all perception
level attacks could be mitigated using such a countermeasure.
are maneuvered within the control station located inside the industrial facility, while
limited egress connectivity is maintained via satellite links with VSAT (Very Small
Aperture Terminal) or microwave in the case of offshore or any other industrialized
plants of such nature.
Due to their offline nature, the probability of any online intrusion is minimal. Though,
any malicious entity such as a worm or a virus injected to the internal SCADA network
could compromise the entire factory. Once inserted into the system, the intention of
the malicious entity would be to disrupt the operations of the facility and its machinery.
Thus, limiting the possibility for any malicious insurgence from the internal network
and employing effective Intrusion Detection System (IDS) to detect malicious entities,
would be the most suitable countermeasure for this application.
Smart
Environment
Smart
Building
Smart Retail
Smart City
Smart Mobility
Smart
Education
traffic and emergencies. All other smart systems explained in the previous sections are,
in fact, subsystems of a functional smart city.
Due to various parameters to be gathered from the sensory acquisitions, heterogene-
ity is immense and the implementation is arduous [39]. At the same time, manage-
ment of the gathered Big Data content is not scalable. Thus, providing security for all
the applications in smart cities would be extremely challenging. Most of the Big Data
content extracted from the sensors is forwarded to clouds through M2M authentica-
tion. Because of large data transmissions, cryptographic schemes should be lightweight
and the authentication mechanism should be dynamic. DoS or DDoS attacks are most
probable and could be mitigated with a strong authentication mechanism [1]. Individ-
ual sensors could be compromised resulting in the initiation of fake emergencies and
access control methods should be improved to avoid such inconsistencies at the sensor
level.
The paper [40] introduces applications of IoT with specific focus on smart homes.
The study presented in [40] claims that although smart homes are offering comfortable
services, security of data and context-oriented privacy are also a major concern of these
applications. The security and privacy issues in IoT applications have also been studied
in [41].
Authorization
Database
System Administrator
Authentication Access
Mechanism Control
System Resources
User
2.3.1 Authentication
Authentication is the process of verifying the identity of an entity [2]. The entity to be
verified could either be human or a machine. Authentication is the first phase of any
access control mechanism which can determine the exact identity of the accessing party
in order to establish the trust of the system. In most cases, authentication is initiated
between a human and a machine in a process to log into the internet banking portal by
entering the credentials. However, in this scenario, the access-seeking entity does not
have a guarantee regarding the identity of the access granting entity. In order to over-
come this concern, mutual-authentication should be established between the entities,
by verifying the identity of the access-granting entity with the involvement of a TTP,
such as a Certificate Authority (CA) [2]. CAs are globally recognized institutions which
are responsible for issuing and maintaining secure digital certificates of web entities reg-
istered under them. These certificates are imperative for the operation of all modern day
authentication protocols such as SSL/TLS, IPSec, and HTTPS.
The process of authentication is merely facilitating credentials of an entity to the access
granting system, which are unique to that entity and could only be possessed by them.
This mechanism could be enabled with or without a TTP. The credentials used are often
categorized as factors. The authentication schemes’ accuracy and efficiency depend on
the number of factors engaged in the mechanism. The types of factors are listed below.
• Knowledge factor – passwords, keys, PINs, patterns
• Possession factor – Random Number Generators (RNG), ATM card, ID card
• Inherence factor – Biometrics such as fingerprint, palm print, iris, etc.
Recent innovations in embedding biometric sensors to smart handheld devices have
enabled the possibility of using multi-factor multi-mode (if more than one bio metric
is used for verification) Human-to-Machine (H2M) authentication protocols for IoT
devices. However, Machine-to-Machine (M2M) authentication can only be conducted
using cryptographic primitives. Moreover, including strong cryptographic primitives
(PKI, Hashing, Timestamps, etc.) for the authentication protocols involved is crucial in
order to ensure data confidentiality, integrity, and availability; as the credentials being
conveyed are highly sensitive and unique for the authenticating entity.
2.3.2 Authorization
Authorization is the process of enforcing limits and granting privileges to the authenti-
cated entities [42]. In simple terms, this is determining the capabilities of an entity in the
system. In order for an entity to be authorized for performing any action, the identity
of that entity should be verified first through authentication. According to Figure 2.7,
an administrator usually configures the authorization database for granting access and
rights to system resources. Each resource is assigned with different rights such as read,
write, and execute. Depending on the level of authorization (clearance) being set by
the administrator, each authenticated entity can perform different actions on resources.
A typical access control system has a policy for granting rights. These policies could
vary from Discretionary Access Control (DAC), Mandatory Access Control (MAC) or
a Multi-Level Security (MLS) model such as Role Based Access Control (RBAC) [42].
In DAC, the administrator specifies the rights, while in MAC there are rules set by the
Introduction to IoT Security 43
system for assigning rights for subjects. Clearances are granted according to the role of
the authenticated entity (Roles: course coordinator, lecturer, or student in a university)
in RBAC.
2.3.3.1.1 Perception Nodes These nodes are distributed across the IoT environment.
Mostly, they are RFID tags and RFID readers/sensors, where few RFID tags are
connected to a RFID reader. The connection establishment between RFID tags and
the reader does not involve an authentication mechanism and would be vulnerable
if the RFID tags could be cloned. An Identity Based Encryption (IBE) scheme was
proposed by [39] for establishing secure communication channels between RFID tags.
Due to resource scarcity, an authentication protocol might be implemented using
techniques such as Elliptic Curve Cryptography (ECC) based Diffie-Hellman (DH) key
generation mechanism [1]. The generated keys, once they are transmitted to each end,
could be used as the shared symmetric key for information transferring via the medium
securely [42]. However, MiM attacks are still feasible and could be solved by employing
the ephemeral DH method; changing the ECC DH exponents for each connection
establishment as a session key.
2.3.3.1.2 Sensor Nodes and Gateways Sensor nodes face the similar security flaws as the
perception nodes. Thus, deploying a proper authentication scheme could eliminate the
possibility of being exposed at a very low level. However, sensors are much more intel-
ligent and resourceful than perception nodes. Hence, M2M authentication could be
established as peer authentications and the origin authentication could be established
44 IoT Security: Advances in Authentication
via the sensor gateway. Similarly, to the perception nodes, ECC-based DH key exchange
would be ideal for sensor nodes, where the ephemeral exponents are facilitated by the
sensor gateway acting as a TTP. Identity validation of the sensor gateway should be con-
ducted prior to any data transfer. Even though using certificates for identity determina-
tion is not practical, a similar parameter such as a serial number could be used when
registering the sensor node in the IoT environment and all the identities are stored in
the sensor gateway for validation. Sensor gateway should also possess a unique iden-
tity for mutual authentication to be established between the sensor node and the gate-
way. Moreover, countermeasures such as integrity violation detection (using Hashed
Message Authentication Code – HMAC or Cipher Block Chaining Mandatory Access
Control – CBC-MAC) and timestamps should be employed with the authentication pro-
tocols involved.
generated keys could be used as the signatures of each mobile entity, for the verification
of their identities and, for conveying a secure session key among the communicating par-
ties with proper encryption schemes. Additionally, authentication credentials should be
checked for probable integrity violations in order to avoid MiM attacks.
2.3.3.2.2 Cloud Computing Clouds are the storage facility of IoT architecture and they
are quite resourceful in terms of memory and processing [37]. Thus, authentication
should employ strong keys that are generated using public-key algorithms such as RSA
or ElGamal, which are inviolable cryptographic primitives if the executing authentica-
tion mechanism are computationally feasible with the available resources. A symmetric
key (Advanced Encryption Standard [AES], Triple Data Encryption Standard (TDES),
etc.) to be used in data transferring between the IoT devices and the cloud could be gen-
erated and shared among the entities engaged in communication. Existing CAs could
be used to validate the identity of the parties involved in communication via mutual
authentication schemes for establishing the trust.
However, the main concern in cloud computing is privacy of the user data. A strong
authentication scheme does not ensure the misuse of information by the CSP. Thus,
approaches such as blockchain and homomorphism should be considered for enhanc-
ing the privacy. The authentication schemes would be more secure in these schemes,
as blockchain support pseudonymity (the nodes are identified from hashes or public
keys – CA not required and simplify the authentication scheme) and the homomor-
phism facilitates an additional layer of encryption to secure the communication [39].
Authorization techniques in clouds should be also be considered, as accessing the
information in the clouds is vital for the IoT design. Existing access control mechanisms
such as RBAC and MAC are no longer scalable or interoperable. Thus, a novel method
called Capability-Based Access Control (CapBAC), which uses capability-based author-
ity tokens to grant privileges to entities was proposed by Kouicem et al. [39].
2.3.3.2.3 The Internet Even though authentication in most applications on the Internet
is pursued by either SSL or IPSec protocols; IoT uses the DTLS as its communication
protocol. However, the dependability of CAs for validating authentication parties still
exists. Chinese CA WoSign was issuing certificates for false subjects in 2016, leaving an
easier access to systems through wrongfully validated certificates for the attackers [2].
This happens when the trust of the system is centralized into a single entity. Thus, dis-
tributed access control schemes such as OpenPGP (widely used for email encryption)
have formidable odds in succeeding in IoT infrastructure. Hokeun et al. in [2] introduces
a locally centralized and globally distributed network architecture called Auth. Auth is
to be deployed in edge devices for providing authorization services for locally registered
entities, by storing their credentials and access policies in its database. Since the other
instances of Auth are being distributed globally in the network, this maintains the trust
relationships among them for granting authorizations for IoT devices acting as a gate-
way. Providing a solution to the trust issue of CAs is the main concern for the Internet,
as the security level in existing protocols is quite adequate.
layer H2M authentication schemes are two-factor authentication schemes, while the
M2M ones are web based such as in SSL. The applicability and effectiveness of existing
schemes are evaluated for each IoT application, since a generic solution is infeasible.
2.3.3.3.1 Smart Utilities – Smart Grids and Smart Metering When using proper techniques,
the intruders could perpetuate AMI interfaces stationed at every household or indus-
trial plant. Once the access is granted to the hostile operators, potential outcomes could
be devastating, from disrupting the level of energy flow from a local grid substation to
overloading the nuclear reactor of a power station. Thus, access to the smart grids should
only be granted to the local grid operator and the monitoring center, avoiding any inter-
facing through the AMI access points. Local-grid operator authentication mechanism
could be employed with a two-factor authentication scheme with a username, password,
and RNG. A biometric scheme could be used depending on the availability of biometric
extraction devices. As the controlling access is given to the operator, an authorization
scheme such as RBAC should be employed, as scalability concern does not exist due to
the limited number operators available for a smart grid. An M2M authentication inter-
face is executed between the smart grid and monitoring center for information access.
Existing security protocols such as SSLs could be used for authentication.
The access to AMI meter could be given to the residential consumer for the purpose
of monitoring statistics. This access could also be based on two-factor authentication or
biometrics as access is only given to read the data and not to manipulate it. Smart Grid
has the ability to access the AMI meter through M2M authentication and should be
secured with strong crypto primitives for preventing any MiM information extraction.
Certificates should be issued to all the smart grids by a CA and identities should be vali-
dated preferably via a mutual authentication scheme when establishing a grid-to-grid
communication channel. A mechanism should be embedded with an authentication
protocol to validate the AMI units for detecting possible tampering scenarios.
2.3.3.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine In a
telemedicine system, the parties to grant access are solely the patients and their physi-
cians. Thus, access should be limited. Authentication protocols should be always H2M
when accessing the information, while M2M authentication operates when updating
sensory information from wearable devices to the server. Access to the patient should
be granted in a two-factor authentication scheme if a PC is being used for access. If the
patient is using a mobile device to access the server, three-factor authentication scheme
could be employed by integrating biometrics. Though, storing all the credentials
including biometric templates at the authentication database would not be scalable
with expanded healthcare services. Still, authentication should be thorough because
accessing PHRs is private and confidential. Cloud servers’ access to physicians could
be granted from a two-factor authentication scheme. Storing and accessing PHRs
at the cloud could be secured using the blockchain concept to counter any obvious
privacy concerns with CSPs. An IBE scheme could be adopted to enhance the message
transferring in the authentication protocol.
2.3.3.3.3 Intelligent Transportation and Logistics Since the vehicles attribute high mobil-
ity, the connectivity of an established wireless link across vehicular entities may vary
rapidly. Hence, the availability of a consecutive/fixed inter-link would be uncertain.
Introduction to IoT Security 47
2.3.3.3.5 IIoT Most IIoT processes are M2M due to their automated platforms.
Further, IIoT process operations are continuous as their work cycles might extend
to hours. With the amount of controlling data flowing through the communication
channels, simultaneous authentication of each sensory node might lessen the efficiency
of the entire smart factory. Thus, a methodology for a scheduled authentication scheme,
which does not affect industrial performance, should be established. However, the
authentication at each sensory node could be evaded, as there could be hundreds of
minor sensors connected to massive machines, which would not be feasible for authen-
tication of each node frequently. Only the control information transfer of machines that
is subject to authentication, as a single controlling command, could continuously last
for hours. These authentication phases could employ heavy cryptographic primitives
as there is no scarcity of computational resources.
perspective of the three layers in IoT. Similar methods proposed for access control in the
perception layer could be adopted for the sensory system in smart environments. The
Network layer accompanies all the internet integrated data connections and routing
devices along with severs (clouds), in addition to the mobile devices. Mobile devices
could use three-factor authentication schemes incorporated with web-based SSL or
DTLS protocols, while cloud servers and routing nodes could be authenticated with
cryptographically generated keys. Authentication protocols in smart cities are likely
to change with the requirements and applications, as all other applications mentioned
under this section are sub-applications of a smart city.
layers are simplified to three layers: perception layer, networking layer and application
layer, as shown in Figure 2.1. The perception layer can be seen as the combination of
the traditional physical layer and the MAC layer. It can include 2D bar code labels and
readers, RFID tags and reader-writers, camera, GPS, sensors, terminals, and sensor net-
work. It is the foundation for the IoT system [45]. The networking layer is responsible for
the data transmission and communication inside the system and with the external
Internet. It should be aware of the different underlying networks no matter whether
it is wired, wireless, or cellular. It can provide support for different communication
modes including base station, access point based or Machine-to Machine type based.
The application layer provides services to the end users and collects data from different
scenarios. IoT has high potential to implement smart and intelligent application for any
scenario in nearly every field. This is mainly because IoT can offer both (i) data collec-
tion through sensing over natural phenomena, medical parameters, or user habits and
(ii) data analysis and predictive modeling for tailored services. Such applications will
cover aspects including personal, social, societal, medical, environmental, and logistics,
having a profound impact on both the economy and society [43]. The perception
and network layer together are considered the foundation for the whole IoT system.
Together, these two layers provide the backbone and fundamental infrastructure of
an IoT system. However, the architecture design and detailed implementation can
normally only be confirmed after knowing the application layer design. Where the
system will be deployed, what size the field will be and what kind of data will be
collected are all issues involved in the applications, but highly affect the decision
making on the perception layer and network layer.
complicates the design and deployment of efficient, interoperable, and scalable security
mechanisms. It has been clearly stated that all typical security issues (authentication,
privacy, nonrepudiation, availability, confidentiality, integrity) exist across all layers and
the entire function box to a certain degree. However, when implementing security solu-
tions, different layers of a variety of systems will have specialized priorities [78].
An essential task of the middleware is to provide secure data transmission between
the upper and lower layers. For inner system communication, it should guarantee that
the data passed to the application layer from the infrastructure is safe and reliable to
use – integrity. Integrity in this scenario involves maintaining the consistency, accu-
racy, and trustworthiness of data over the transmission. Conversely, the middleware
should also ensure that the control comments and queries from the applications/end
users are verified and it is harmless for the system to take actions – non-repudiation.
Non-repudiation features ensure that users cannot deny the authenticity of their signa-
ture for their documents and footprints for their activities. In addition, the middleware
must protect the data transmission and information exchange between the upper and
lower layers from illegal external access by any arbitrary user. The data must not be
disclosed to any unauthorized entities – confidentiality.
2.4.4 Privacy
As the new European General Data Protection Regulation (GDPR)2 has become enforce-
able on the 25 May 2018, protecting user data and securing user privacy are urgent
2 https://www.eugdpr.org
Introduction to IoT Security 51
and predominant issues to be solved for any IoT application. Users’ data can neither
be captured nor used without their awareness. Privacy has the highest priority for all
existing and future application development, including IoT systems [100]. User identi-
ties must not be identifiable nor traceable. Under the new legislation, data processing
must involve:
1) Lawful, fair, and transparent processing – emphasizing transparency for data
subjects.
2) Purpose limitation – having a lawful and legitimate purpose for processing the infor-
mation in the first place.
3) Data minimization – making sure data is adequate, relevant and limited, and organi-
zations are sufficiently capturing the minimum amount of data needed to fulfill the
specified purpose.
4) Accurate and up-to-date processing – requiring data controllers to make sure infor-
mation remains accurate, valid, and fit for purpose.
5) Limitation of storage in a form that permits identification – discouraging unneces-
sary data redundancy and replication.
6) Confidential and secure – protecting the integrity and privacy of data by making sure
it is secure (which extends to IT systems, paper records and physical security)
7) Accountability and liability – the demonstrating compliance. As a well-known state-
ment in security, there are security issues at all perception, network, and application
layers.
Some other security problems can be addressed effectively and efficiently on a certain
layer level, such as implementing privacy components on the application layer. In a
healthcare system, patients should be totally aware who is collecting and using their
data. They also should have control over the data and who they want to share it with, as
well as how and where their data is being used. The applications should provide services
and interface to allow users to manage their data. Users must have tools that allow them
to retain their anonymity in this super-connected world. The same scenario can be
applied to systems such as smart home, smart transportation, etc. IoT applications may
collect users’ personal information and data from their daily activities. Many people
would consider that data or information predicted from the data as private. Exposure
of this information could have an unwanted or negative impact on their life. The use of
the IoT system should not cause problems of privacy leaking. Any IoT applications
which do not meet with these privacy requirements could be prohibited by law. The IoT
system must seriously consider the implementation of privacy by the 7 data protection
principles, providing user-centric support for security and privacy from its very own
foundations [60].
world. Another way to mitigate risk is to keep abreast of the times by improving and
innovating, from the ground up, and by finding new methods and designs to outgrow
the shortcomings of the market.
2.5 Discussion
Authentication for IoT is a paramount necessity for securing and ensuring the privacy
of users, simply due to the fact that an impregnable access control scheme would be
impervious for any attack vector originating outside of the considered trust domain,
as explained in the previous sections of this chapter. Authentication schemes in IoT
applications are generally implemented at the software level, where it exposes uninten-
tional hardware and design vulnerabilities [82]. This fact constitutes the requirement of
a holistic approach for securing access to the systems via the employment of impreg-
nable authentication schemes. However, developing a generic authentication scheme to
counter all possible attack scenarios would be improbable and an arduous attempt due
to the heterogeneity of the IoT paradigm. A layered approach that identifies the distinct
authentication requirement is desired to formalize a holistic trust domain.
For perception level entities, IBE or ECC would be ideal authentication schemes to
generate commendable cryptographic credentials with available resources. The mobile
entities, where actual users are interfacing to IoT systems are storing personalized
credentials such as photos, medical stats, access to CCTV systems, GPS location (GPS),
daily routines, financial statistics, banking credentials, emergency service status and
online account statistics, are emphasizing the need for privacy preservation at this
level. As proposed in Section 2.3.3.1.1, adopting IBE, ABE, ECC, or biometric-based
mechanisms should ensure security. Novel mechanisms such as CapBAC could be
employed to launch a scalable access control scheme for cloud computing platforms
for IoT applications. However, the potential for deploying edge computing paradigms
in the edge of the network indemnifies the cloud computing services from external
direct access, as the access control would be migrated to the edge along with the
service platform. The internet technologies of IoT-enabled systems are more secured
than the perception level and mobile level entities with the deployed protocols such
as DTLS, SSL, and IPSec. Due to the dependency of a CA or TTP for employing such
strong and secure protocols, the future of Internet security enhancements would be
focused on developing distributed access control schemes to eliminate the single point
of failure. Each IoT application composes different devices and systems to accomplish
the intended outcome which attributes diverse protocols in hardware and software.
Thus, the authentication schemes should be application specific and context aware of
resource constraints associated with the diversified deployments. As privacy is the main
concern on IoT to be ensured through impregnable access control schemes, the GDPR
initiative is a timely solution established to constrict the IoT service providers (both
software and hardware) from developing and marketing products with vulnerabilities.
Current researches have focused on developing novel methods for authentication in
the IoT domain. We are briefly introducing a few of these recent approaches to demon-
strate the state-of-the-art technologies.
In [86], Ning et al. has proposed an aggregated proof-based hierarchical authentica-
tion (APHA) scheme to be deployed on existing Unit IoT and Ubiquitous IoT (U2IoT)
Introduction to IoT Security 53
IoT applications, the breath print extraction would be dependent on the health, climatic
circumstances and physical stability of the user.
If the proposed authentication schemes are not fully holistically applicable for IoT
deployments, optimum solutions at different layers and specific applications could be
aggregated to form an impregnable access control system, where the interconnectivity
across them should be maintained by decentralized trust domain managers. However,
the access control mechanism optimum for each application should be investigated for
each case in order to ensure robustness.
2.6.1 Blockchain
The blockchain is a distributed database of online records. Typically used in financial
transactions for the Bitcoin cryptocurrency, the peer-to-peer blockchain technology
records transactions without exception, in exchange, to form an online ledger system.
Blockchain technologies are immutable, transparent, trustworthy, fast, decentralized,
and autonomic, providing solutions that can be public, consortium, or private. Due to
the success of Bitcoin, people are now starting to apply blockchain technologies in many
other fields, such as financial markets, supply chain, voting, medical treatment and secu-
rity for IoT [61, 99]. There are expectations that blockchain will revolutionize industry
and commerce and drive economic change on a global scale [62].
Blockchain technology leads to the creation of secure mesh networks, where IoT
devices will interconnect while avoiding threats such as impersonation or device
spoofing. As more legitimate nodes register on the blockchain network, devices will
identify and authenticate each other without a need for central brokers and certification
authorities. The network will scale to support more and more devices without the need
for additional resources [63].
Smart contracts open the way to defining a new concept, a decentralized autonomous
organization (DAO), sometimes labeled as a Decentralized Autonomous Corporation,
an organization that runs through rules maintained on a blockchain. The legal status
of this new brand of business organization is rather seen as a general partnership,
meaning that its participants could bear unlimited legal liability. Ethereum blockchain,
for example, is a public blockchain network optimized for smart contracts that use its
cryptocurrency, called Ether (ETH). There is a huge interest in Ethereum, as a
blockchain technology for the future. In 2017, Enterprise Ethereum Alliance was
formed and already counts close to 250 members, like Samsung, Microsoft, J.P.Morgan,
Toyota, ING, Consensys, BP, Accenture and many others. Etherum has become
the second highest traded cryptocurrency in 2017, after Bitcoin, with a volume of
transactions for over half of million euros in a single 24-hour period.
As with each disruptive concept that turns into an effective offering, the blockchain
model is not perfect and has its flaws and shortcomings. Scalability is one of the main
issues, considering the tendency toward centralization with a growing blockchain. As
Introduction to IoT Security 55
the blockchain grows, the nodes in the network require more storage, bandwidth, and
computational power to be able to process a block, which currently leads to only a hand-
ful of the nodes being able to process a block. Computing power and processing time
is another challenge, as the IoT ecosystem is very diverse and not every device will be
able to compute the same encryption algorithms at the desired speed. Storage of a con-
tinuously increasing ledger database across a broad range of smart devices with small
storage capabilities, such as sensors, is yet another hurdle. The lack of skilled people
to understand and develop the IoT-blockchain technologies together is also a challenge.
The lack of laws and a compliance code to follow by manufacturers and service providers
is not helping both the IoT and blockchain to take off as expected.
IOTA solves some problems that the blockchain does not. One of them is centraliza-
tion of control. As history shows, small miners create big groups to reduce the variation
of the reward. This activity leads to concentration of power, computational, and politi-
cal, in possession of just a handful of pool operators and gives them the ability to apply
a broad spectrum of policies, like filtering on or postponing certain transactions.
2.6.2 5G
For the first time in history, LTE has brought the entire mobile industry to a single
technology footprint resulting in unprecedented economies of scale. The converged
footprint of LTE has made it an attractive technology baseline for several segments that
had traditionally operated outside the commercial cellular domain. There is a growing
demand for a more versatile M2M platform. The challenge for industrial deployment of
IoT is the lack of convergence across the M2M architecture design that has not mate-
rialized yet. It is expected that LTE will remain as the baseline technology for wide-
area broadband coverage also in the 5G area. The realization of 5G network is affecting
many IoT protocols’ initial design, especially at perception and network layers [64, 102].
Mobile operators now aim to create a blend of pre-existing technologies covering 2G,
3G, 4G, WiFi, and others to allow higher coverage and availability, as well as higher net-
work density in terms of cells and devices with the key differentiator being greater con-
nectivity as an enabler for M2M services [65]. 3GPP standard/5G-based backhaul has
become a popular solution for connectivity problems in IoT systems. Munoz et al. indi-
cates that the next generation of mobile networks (5G), will need not only to develop new
radio interfaces or waveforms to cope with the expected traffic growth but also to inte-
grate heterogeneous networks from End-to-End (E2E) with distributed cloud resources
to deliver E2E IoT and mobile services [66]. Fantacci et al. has provided a backhaul
solution through mobile networks for smart building applications [67]. The proposed
network architecture will improve services for users and will also offer new opportuni-
ties for both service providers and network operators. As 5G has become available and is
being adopted as the main backhaul infrastructure for IoT system, it will play a huge role
in IoT perception and networking layers [68]. 5G has moved the focus to a user-centric
service from a network-centric service unlike 4G and 3G. With massive multiple-input
and multiple-output (MIMO) technologies deployed in 5G, network selection and rapid
handovers are becoming essential in terms of supporting QoS and Quality-of-user Expe-
rience (QoE) aware services [69]. The handover between different network interfaces
should be authenticated and the information exchange during the handover should be
protected and private. Currently, SDN is considered as the mainstream for a higher
56 IoT Security: Advances in Authentication
of client data takes place at the outer edge of the network, in the proximity of the
originating source. Mobile computing, low cost of computer components and the abso-
lute quantity of IoT devices drive the move toward edge computing. Time-sensitive
data is processed at the point of origin by an intelligent and resource-capable device
or sent to a broker server located in close geographical proximity to the client. Less
time-sensitive data travels to the cloud for historical analysis, big data analytics,
and long-term storage. One of the greatest benefits of edge computing is that it
removes network bottlenecks by improving time to action and response time down to
milliseconds, while also conserving network resources.
The edge computing concept is not without its flaws though. Edge computing raises a
high amount of security, licensing and configuration challenges and concerns. The vul-
nerability to some attack vectors like malware infections and security exploits increases
because of the nature of the distributed architecture. Smart clients can have hidden
licensing costs, where the base version of an edge client might initially have a low price,
additional functionalities could be licensed separately and will drive the price up. Also,
decentralized and poor device management leads to configuration drift by the admin-
istrators. They can inadvertently create security holes by not consistently updating the
firmware or by failing to change the default password on each edge device [75].
namely; FP1 – service business plane, FP2 – service orchestration and management
plane, FP3 – IP/ICN orchestrator plane, FP4 – domain service orchestration and
management plane and FP5 – infrastructure plane. FP1 interfaces with external 5G
users in providing various service Application Programme Interfaces (APIs) which
realize the objective and relevant services to accomplish that objective with inputs
such as service type, demand patterns, Service Level Agreements (SLAs)/QoS/QoE
requirements. The service requests forwarded by FP1 are communicated to the FP3 as
service requirements by FP2. The FP3 interfaces with a domain controller to virtualize
compute, storage, and network resources to meet the service requirements conveyed
from FP2. FP4 supports the management of IP and ICN services belonging to different
technological domains such as 4G/5G Radio Access Network (RAN), Multi-Protocol
Label Switching (MPLS) and edge technologies, while FP5 enables the service rules in
end-to-end manner.
The entities operating in network slicing infrastructure, such as network slice man-
ager and host platforms are attributing the vulnerabilities exploitable by impersonation
attacks, DoS, SCA attacks and the interoperability of different security protocols and
policies [93]. An IoT user may access different slices depending on both the require-
ments and the intended outcomes. Thus, the access granting control for different slices
is a critical juncture in the perspective of security. The plausibility for isolating the slices
for constricting the deliberate hacking attempts at resources operating at each plane
should be focused. Due to the facts that a network slice is a composite of the actual
physical infrastructure and the processes should be dynamic, adaptive, and flexible for
servicing the intended functions, the assurance of user confidentiality, privacy, integrity,
and availability are challenging. However, authentication is the most effective mech-
anism to be used for enhancing the robustness of the network slices toward attacks.
Among the 5G Security –as-a-Service (SaaS) concepts, micro-segmentation, deception
of the attacker and AI deployments for monitoring, attack detection and remediation
are emerging initiatives for securing network slices [95].
2.7 Conclusions
IoT technology is the most discussed paradigm in the research community these days.
Its potential to connect all the devices in the world and to create a large information
system that would offer services to improve the quality of human beings exponentially
has made the concept much more popular. The integration of various technologies and
devices with different architectures are creating interoperability issues with the com-
ponents in the IoT architecture. These issues and the highly diversified type of services
are creating security concerns which disperse into all three layers of IoT architecture:
Perception, Network, and Application. Hence, the security measures to be taken should
be developed while analyzing the threats and vulnerabilities at each layer.
Mitigating risks associated with security breaches are possible, if security receives
consideration from early product planning and design, and if some basic prevention
mechanisms are in place. Enactment and standardization will simplify the manufactur-
ing and development processes, give the market an incentive for mass-adoption and
also increase the security posture of IoT products and services. Security will have to be
inbuilt so that IoT can withstand a chance against the threats that technological advance-
ments will bring.
Introduction to IoT Security 59
References
1 Alaba, F., Othman, M., Hashem, I., and Alotaibi, F. (2017). Internet of things secu-
rity: a survey. Journal of Network and Computer Applications 88: 10–28.
2 Kim, H. and Lee, E.A. (2017). Authentication and authorization for the internet of
things. IT Professional 19 (5): 27–33.
3 Jurcut, A., Coffey, T., Dojen, R., and Gyorodi, R. (2008). Analysis of a
key-establishment security protocol. Journal of Computer Science and Control
Systems 2008: 42–47.
4 Jurcut, A.D., Coffey, T., and Dojen, R. On the prevention and detection of replay
attacks using a logic-based verification tool. In: Computer Networks, vol. 431
(eds. A. Kwiecień, P. Gaj and P. Stera), 128–137. Switzerland: Springer International
Publishing.
5 Jurcut, A.D., Liyanage, M., Chen, J. et al. (2018). On the security verification of a
short message service protocol. Presented at the. In: 2018 IEEE Wireless Communi-
cations and Networking Conference (WCNC). Barcelona, Spain: (April, 2018).
6 Deogirikar, J. and Vidhate, A. (2017). Security attacks in IoT: a survey. In: 2017
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud).
Coimbatore, India: (February 2017).
7 Pasca, V., Jurcut, A., Dojen, R., and Coffey, T. (2008). Determining a parallel session
attack on a key distribution protocol using a model checker. In: ACM Proceed-
ings of the 6th International Conference on Advances in Mobile Computing and
Multimedia (MoMM ’08) Linz, Austria (24–26 November). New York, USA: ACM.
8 Jurcut, A.D., Coffey, T., and Dojen, R. (2017). A novel security protocol attack
detection logic with unique fault discovery capability for freshness attacks
and interleaving session attacks. IEEE Transactions on Dependable and Secure
Computing https://doi.org/10.1109/TDSC.2017.2725831.
9 Liyanage, M., Braeken, A., Jurcut, A.D. et al. (2017). Secure communication channel
architecture for software defined Mobile networks. Journal of Computer Networks
114: 32–50.
10 Jurcut, A., Coffey, T., and Dojen, R. (2014). Design requirements to counter par-
allel session attacks in security protocols. Presented at the. In: 12th IEEE Annual
Conference on Privacy, Security and Trust (PST’14). in Toronto Canada (July 2014).
11 Jurcut, A.D., Coffey, T., and Dojen, R. (2014). Design guidelines for security proto-
cols to prevent replay & parallel session attacks. Journal of Computers & Security
45: 255–273.
12 Jurcut, A.D., Coffey, T., and Dojen, R. (2012). Symmetry in security protocol cryp-
tographic messages – a serious weakness exploitable by parallel session attacks.
Presented at the . In: 7th IEEE International Conference on Availability, Reliability
and Security (ARES’12). Prague, Czech Republic: (August 2012).
13 Jing, Q., Vasilakos, A.V., Wan, J. et al. (2014). Security of the internet of things: per-
spectives and challenges. Wireless Networks 20 (8): 2481–2501.
14 Zhao, K. and Ge, L. (2013). A survey on the internet of things security. Presented
at the. In: 2013 9th International Conference on Computational Intelligence and
Security (CIS). in Leshan, China (December 2013).
15 Weis, S.A., Sarma, S.E., Rivest, R.L., and Engels, D.W. (2004). Security and privacy
aspects of low-cost radio frequency identification systems. In: Security in Pervasive
60 IoT Security: Advances in Authentication
53 Perera, C., Jayaraman, P.P., Zaslavsky, A. et al. (2014). Mosden: an internet of things
middleware for resource constrained mobile devices. In: 47th Hawaii International
Conference on System Sciences. Hawaii, USA (6–9 January 2014): IEEE.
54 Zhou, H. (2012). The Internet of Things in the Cloud: A Middleware Perspective, 1e.
Boca Raton, FL, USA: CRC Press, Inc.
55 Xu, L., Lillis, D., O’Hare, G.M., and Collier, R.W. (2014). A user configurable metric
for clustering in wireless sensor networks. In: SENSORNETS. Lisbon, Portugal
(7–9 January 2014): SciTePress.
56 Ngu, A.H., Gutierrez, M., Metsis, V. et al. (2017). Iot middleware: a survey on
issues and enabling technologies. IEEE Internet of Things Journal 4: 1–20.
57 Srivastava, V. and Motani, M. (2005). Cross-layer design: a survey and the road
ahead. IEEE Communications Magazine 43: 112–119.
58 Zhang, Q. and Zhang, Y.Q. (2008). Cross-layer design for qos support in multihop
wireless networks. Proceedings of the IEEE 96: 64–76.
59 Zanella, A., Bui, N., Castellani, A. et al. (2014). Internet of things for smart cities.
IEEE Internet of Things Journal 1: 22–32.
60 Roman, R., Zhou, J., and Lopez, J. (2013). On the features and challenges of secu-
rity and privacy in distributed internet of things. Computer Networks 57 (10):
2266–2279.
61 Lin, I., I.C. and Liao, T.C. (2017). A survey of blockchain security issues and
challenges. International Journal of Network Security 19: 653–659.
62 Underwood, S. (2016). Blockchain beyond bitcoin. Communications of the ACM 59:
15–17.
63 How blockchain can change the future of IoT (2016). https://venturebeat.com/2016/
11/20/how-blockchain-can-change-the-future-of-iot (accessed 16 July 2019).
64 Chiang, M. and Zhang, T. (2016). Fog and iot: an overview of research
opportunities. IEEE Internet of Things Journal 3: 854–864.
65 Liyanage, M., Ahmad, I., Abro, A.B. et al. (eds.) (2018). A Comprehensive Guide to
5G Security. Wiley.
66 Munoz, R., Mangues-Bafalluy, J., Vilalta, R. et al. (2016). The cttc 5g end-to-end
experimental platform: integrating heterogeneous wireless/optical networks,
distributed cloud, and iot devices. IEEE Vehicular Technology Magazine 11: 50–63.
67 Fantacci, R., Pecorella, T., Viti, T., and Carlini, C. (2014). A network architec-
ture solution for efficient iot wsn backhauling: challenges and opportunities. IEEE
Wireless Communications 21: 113–119.
68 Ahmad, I., Kumar, T., Liyanage, M. et al. (2018). Overview of 5G security chal-
lenges and solutions. IEEE Communications Standards Magazine 2 (1): 36–43.
69 Xu, L., Xie, J., Xu, X., and Wang, S. (2016). Enterprise lte and wifi interworking
system and a proposed network selection solution. In: 2016 ACM/IEEE Symposium
on Architectures for Networking and Communications Systems (ANCS). Santa Clara,
USA (17–18 March 2016): ACM/IEEE.
70 Liyanage, M., Gurtov, A., and Ylianttila, M. (eds.) (2015). Software Defined Mobile
Networks (SDMN): Beyond LTE Network Architecture. New York: Wiley.
71 Liyanage, M., Abro, A.B., Ylianttila, M., and Gurtov, A. (2016). Opportunities and
challenges of software-defined mobile networks in network security. IEEE Security
and Privacy 14 (4): 34–44.
Introduction to IoT Security 63
Part II
Abstract
This chapter starts with an introduction on different methods to provide key establishment
and authentication using symmetric key-based mechanisms limited to hashing, xoring
and encryption/decryption operations. Based on an idea coming from the context of
multi-server authentication, and already applied in several IoT contexts, we present a new
key management protocol for wireless sensor networks with hierarchical architecture,
using solely symmetric key-based operations. The protocol establishes confidentiality,
integrity, and authentication. It supports various communication scenarios, has limited
storage requirements, is highly energy efficient by minimizing the number of communi-
cation phases and cryptographic operations, and avoids message fragmentation as much
as possible. With the pre-installation of an individual secret key with the base station
and some additional key material different for cluster head and cluster node, all possible
keys in the network can be efficiently on-the-fly computed and updated. We discuss
the differences with the well-known LEAP key management system for wireless sensor
networks.
3.1 Introduction
When a common secret is shared between two entities, symmetric key schemes in
authenticated encryption (AE) mode, like for instance AES-GCM or AES-CCM, can be
applied. However, in order to construct such an authenticated key, called the session
key, either public key-based or symmetric key-based mechanisms can be used. The
advantage of symmetric key-based mechanisms is that they require much less compu-
tational efforts and smaller messages, compared to the public key-based variants. The
main challenge is how to efficiently construct this key in a scalable way. For instance, it
would be very impractical if the device needs to store secret information corresponding
to each different device with which it wants to communicate. Typically, a trusted third
party (TTP) is involved in these protocols in order to manage the process.
There are different architectures to be considered, either a one-to-one communication
or one-to-many communication setting. In a one-to-one communication, two devices
construct a common secret key, with the aid of the TTP. Each device only needs to share
IoT Security: Advances in Authentication, First Edition.
Edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, and Mika Ylianttila.
© 2020 John Wiley & Sons Ltd. Published 2020 by John Wiley & Sons Ltd.
68 IoT Security: Advances in Authentication
a secret key with the TTP. The Needham-Schroeder protocol [1] solves this problem.
However, this protocol was found to be vulnerable for a replay attack [2], and was finally
fixed in order to lead to the symmetric variant of the Kerberos protocol [3].
Recently, many advances have been made in protocols describing one-to-many
communication. In particular, the two-factor and three-factor based multi-server
login protocols have evolved a lot since 2016, by including, in addition, anonymity
and untraceability features [4]. These protocols can very easily be adopted in an IoT
setting. For instance, in [5], we have shown how the technique can be used to provide
different stakeholders (residents, recurring guests, or temporary guests) end-to-end
secure access to the IoT devices in a smart home, managed by the home owner in an
anonymous way. Here, the IoT devices take the role of gateway, receiving the requests
from stakeholders who are in possession of a user device and thus enable two-factor
or three-factor authentication. In [6], we also address the smart home scenario, but
describe a key construction between IoT devices and gateway guaranteeing anonymity
of the IoT device, without direct involvement of users. Consequently, the role of the
IoT device in both [5] and [6] is different.
In this chapter, we want to demonstrate how the same idea can be used to construct
a key management protocol for wireless sensor networks (WSNs), being an important
part of IoT. The popularity of WSNs has grown tremendously during the last decade,
due to the multitude of application areas. Security in these networks has also been
extensively researched and standardized. However, these standardizations often do not
include mechanisms for key management. Nevertheless, key management is essential
in this whole procedure in order to send secure and authenticated messages. Minimal
security features to be established are confidentiality, integrity, and authentication. Effi-
cient mechanisms are required, due to the limited bandwidth, processing power, storage
capacities, and battery age. Efficiency implies scalability and adjustability [7]. Scalability
in the sense that the key management protocol is able to include additional nodes in a
secure manner during the network’s lifetime. Adjustability implies a proper mechanism
to deal with network condition changes.
The key management protocol proposed in this chapter, called symmetric authen-
ticated key agreement (SAK), is for sensor networks with a hierarchical architecture,
consisting of base station (BS), cluster heads (CHs), and cluster nodes (CNs). Only
symmetric key-based operations are used to establish confidentiality, integrity, and
authentication. Based on a preshared individual key between each sensor node and the
BS and some additional key material different for CN and CH, secret keys are derived
between CN and CH, two CNs of the same cluster, a group key among all the CHs and
the BS, a group key among all CNs belonging to a certain CH, and a group key among
a selected group of CNs inside a cluster.
The mechanisms to derive these keys are constructed in such a way that the number
of communication phases among the involved entities and message fragmentation is
limited as much as possible. Moreover, the storage requirements for the key derivation
in each entity is very small, related to other previous work. If a node is captured, then
awaiting the update of the BS for each individual node in the cluster, a change mode is
proposed to derive new values for the keys among all trusted nodes in the same cluster
with and without the CH.
The remainder of the chapter is organized as follows. Section 3.2 provides an overview
of the related work in key management protocols for WSNs. Section 3.3 explains the
Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks 69
network architecture with some key definitions and assumptions used. In Section 3.4,
we explain the different phases of our scheme in normal mode in detail. We show how to
include authentication in Section 3.5. Section 3.6 discusses the system in change mode,
offering an answer to situations where the system is attacked or where a node changes its
place, is added, or removed from the network. Sections 3.7 and 3.8 respectively describe
the security analysis and the corresponding efficiency. Finally, section 3.9 concludes the
paper.
For our protocol, we use a trick where CNs and their corresponding CH share different
content, that when combined uniquely determines the sender of a message. As explained
before, this idea is inspired from a protocol for a biometric-based multi-server login [4].
3.3.2 Setting
We consider a sensor network with a three-layered architecture, being the BS, the CH
j
nodes Cj , and the CNs Li belonging to a particular CH Cj . Let us assume that each sensor
node (CHs and CNs) participating in the network, has a pre-installed secret shared key
with the BS, an identifier, some auxiliary key material derived from the identifier and
different in structure for CHs and CNs, and a common network key kn . This information
is stored in each sensor node, before the node is put into the field. The position of the
nodes, i.e. combination of CN and CH, does not need to be known in advance, only
the fact that a node will behave as CH or CN. Since CHs need to perform a considerably
higher amount of processing, more powerful nodes are used for this task and distinction
is easy.
Once the nodes are put in the field, the CH broadcasts its identity IDj and a timestamp
j
ts . Next, the key management protocol will describe how each node Li will be able to
construct three on-the-fly-different types of keys.
– Group node key knj . This key is shared among all nodes and CH in the cluster with
CH, Cj .
j
– Multicast key kmj : This key is shared among a selected group of nodes Li by the CH
Cj .
j
– Individual cluster key kij . This key is uniquely shared between Li and the CH Cj .
j j
– Pairwise key ki1i2 . This key is shared between the nodes Li1 and Li2 in the same cluster.
Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks 71
kn
BS
knj
kmj
Cj
kinj
ki1i2
Linj
Li1j Li2j Li3j Li4j Li5j
Figure 3.1 This figure shows an example of the different possible keys in the scheme with base station
j
BS, cluster head Cj and corresponding cluster nodes Li . The network key is denoted by kn , the group
node key by knj , the multicast key by kmj , the pairwise key by ki1j1 and the individual cluster key by kinj .
When the BS sends a timestamp tb to the CHs in the network, the CHs are also able
to derive a group key shared among the CHs and the BS, called the group cluster key kg.
In addition, the CH can also derive on-the-fly the group node key knj , the multicast key
kmj , and the individual cluster key kij . Moreover, we also explain how we include authen-
tication into the communication. Fig. 3.1 illustrates the involved entities for examples
of different types of keys.
The communication capacity between the different entities in the nodes differs due
to the difference in resources. The BS can in any case unicast or broadcast information
directly to the CHs or the CNs. A CH communicates to the BS in a multi-hop way,
while it is able to unicast or broadcast directly to all nodes in its cluster. A sensor node
communicates to its CH in single hop or multiple-hop, dependant on its distance.
3.3.3 Notations
We represent a hash function by H. The encryption operation of message m under a key
K to obtain the ciphertext c is denoted as c = EK (m), and the corresponding decryption
operation as m = DK (c). Furthermore, the concatenation of values m1 and m2 is denoted
by m1 ||m2 and the xor operation by m1 ⊕ m2 .
3.4.1.1 Installation of CH
The following material is installed at each CH, called Cj .
– The network key kn .
– The identifier IDj .
– An individual shared key with the BS, being kj . In order to decrease the storage
requirements of the BS, these keys can be derived from a master key Km and the
corresponding identity of the node, i.e. kj = H(Km ||IDj ).
– The auxiliary key material consists of
H1 = H(IDj ||H(Kn ))
H2 = H(Km ) (3.1)
3.4.1.2 Installation of CN
The following material is installed at each CN.
– The network key kn .
j j
– The individual shared key with the BS, ki = H(Km ||IDi ).
– Define
j
Ai = H(IDi ||H(Km ||Km )). (3.2)
Then, the following auxiliary key material, is also stored at each CN.
j j
Bi = H(Km ) ⊕ Ai
j j j
Ci = ki ⊕ H(Ai )
j j
Di = H(Kn ) ⊕ ki (3.3)
Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks 73
j
Note that any direct reference to the original identity IDi is removed from the node’s
j
memory. From now on, the node will communicate under the identity Bi . Consequently,
the supplier is not able to follow its nodes in the network. In order to increase the diffi-
j
culty of a node’s capture attack, we will show later that it is sufficient only to protect ki
and kn by means of software obfuscating techniques, for example [22, 23]. We consider
these measures outside the scope of this paper.
Finally, we also want to draw attention to the division of the key material. Both CH
and CN each possess one secret master key of the BS and a variable which is derived
from the other secret master key.
3.4.3.1 CN to CH
j
The following steps are executed by Li .
j
– First H(Kn ) is derived from Di .
j
– In addition, Li also computes from its stored values
j j j
H(Ai ) = Ci ⊕ ki (3.5)
j
– Next, Li chooses a random value kij , which will serve as an individual cluster key and
computes:
j
M1 = H(IDj ||H(Kn )) ⊕ H(H(Ai )||kij )
j
M2 = kij ⊕ H(Ai )
74 IoT Security: Advances in Authentication
3.4.3.2 CH to CN
j
We now assume that the CH is aware of the presence of the CN Bi in its cluster. For
instance, the CN could have already sent some information to the CH before, as shown
in the previous step. The CH then performs the following steps to derive the individual
cluster key.
j j j j
– The CH first extracts Ai from the sensor node’s public parameter Bi , by Ai = Bi ⊕
H(Km ).
– In order to add randomness to it, a random parameter r is chosen and the individual
cluster key is defined by
j
kij = H(H(Ai )||r||H(IDj ||H(Kn ))). (3.7)
Note that the last part is required to make sure only CH Cj is able to establish this
message.
j
– The CH sends to the CN Li
r||IDj ||H(r||kij ) (3.8)
j j
The CN Li receives this message and computes H(Ai ) (Equation 3.5) and the value
H(IDj ||H(Kn )). Consequently, the shared key kij from Equation 3.7 can be determined.
Finally, in order to check the integrity of the key, the value H(r||kij ) is computed and
checked with the last part of the received message. If the integrity control is positive,
j
then Li can conclude that the CH Cj wants to share the key kij .
using ki1j and ki2j . However, we propose a protocol here that allows the construction of
a pairwise key, only shared between the sensor nodes and not with the CH.
The idea is based on the fact that the nodes of the cluster and not the CH share the
secret value H(Kn ). On the other hand, the CH shares with each individual node the
j j
value H(Ai ). Consequently, the node Li1 needs to request unique information from the
j j j
CH (based on Ai2 ) on node Li2 , corresponding with phase 1. If Li1 is correctly authenti-
j j
cated, this info is sent from CH to Li1 in phase 2, which puts Li1 in the knowledge of uniqe
j
information only shared by Li2 . Finally in phase 3, the key can be constructed using this
j j
information and the value H(Kn ) by Li1 in order to uniquely share a key with Li2 without
involvement of the CH. Let us now describe these three phases into more detail.
j j j
– Phase 1: Li1 → Cj Here, Li1 requests some unique information, able to distinguish Li2
from the cluster group. Therefore, it first generates a random value r and sends a key
request KR. The first part of the message is to derive the individual cluster key ki1j as
described in Equation 3.6.
Bi1 ||M1 ||M2 ||Eki1j (KR||Bi2 ||r)
j
– Phase 2: Cj → Li1 Cj first derives the key ki1j as described in the previous paragraph.
Then, if Cj can correctly decrypt the last part of the message, the following computa-
tions are performed:
• A new value for ki1j = H(H(Ai1 )||r||H(IDj ||H(Kn ))).
• A value to distinguish Bi2 , asked by Bi1 : H(H(Ai2 )||Bi1 ||r). Only the CH is able to
compute this value since the other CNs have no knowledge on H(Km ).
j
The value r||IDj ||Eki1j (r||H(H(Ai2 )||Bi1 ||r)) is sent to Li1 .
j j
– Li1 → Li2 First, the key ki1j should be derived, as explained in the previous para-
graph, in order to decrypt the message. Note that instead of sending H(r||kij ) as in
Equation 3.8, only a ciphertext is sent. If after decryption, the first part of the plain
text contains the random value r, the integrity of the key is verified.
Next, a random value ki1i2 is chosen, which will serve as pairwise key. An additional
random value r2 is chosen. Now, the following computations are performed.
M0 = r||EH(H(Ai2 )||Bi1 ||r) (r2 ||r)
M2 = ki1i2 ⊕ H(Bi2 ||r2 ) ⊕ H(Kn )
V1 = H(ki1i2 ⊕ Bi1 )
j
The values Bi1 ||M0 ||M2 ||V1 are sent to Li2 .
j j
– Phase 3: Key derivation by Li2 In the last step, the receiver node Li2 , starts with
decrypting the last part of M0 , by computing the key H(H(Ai2 )||Bi1 ||r). If the last part
j
of the decrypted message is equal to the random value r, the node Li2 concludes that
the key request is coming from a validated node of the cluster since only the CH is
able to compute the value of H(Ai2 ). The originator of the message is verified since
j
it is included in the key computation. After successful decryption, the node Li2 can
continue its computations with the random value r2 from M0 . From M2 , the key ki1i2
can be easily computed. Finally, the integrity of the key is checked with comparing
j
the outcome of the message H(ki1i2 ⊕ Bi ) and the received V1 .
76 IoT Security: Advances in Authentication
3.4.5.1 Initiation by CH
Suppose there are n nodes in the cluster, with identities Bi1 , … , Bin . The CH, Cj , chooses
a random key kmj . The following steps are now performed:
j
– First, all the shared keys kij = H(H(Ai )||H(kmj )||H(IDj ||H(Kn ))) for i ∈ {i1, … , in} of
the nodes in the cluster are computed (cf. Equation 3.7 with r = H(kmj ))
– Next, we determine the polynomial of degree n with Lagrange interpolation through
j j
the n points (xi , yi ) = (H(kij ||0), H(kij ||1)) with i ∈ {i1, … , in}, together with the point
(0, kmj ). We derive n other points P1j , … , Pnj on this polynomial.
j
– The following message is then broadcast to the nodes Li in the cluster.
kg = H2 ⊕ tb = H(Km ) ⊕ tb
We show how authentication can be guaranteed in here and how to use this key in an
authenticated way in Section 3.5.
Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks 77
3.5 Authentication
Since all entities in the network know the network key and all CNs in the same cluster
know the group node key, it is a challenge to obtain authentication in these communi-
cations. A classical method, as proposed in LEAP, is the use of one-way key chains [21]
in each entity. This method has the disadvantage that it is not resistant against insider
attacks and possesses large storage requirements. Here, we propose a different method
and make distinction between the authenticated usage of knj and kn by a CN, a CH, and
the BS.
3.5.1 Authentication by CN
Due to the particular construction of the security material in each CN, every CN can
j
authenticate itself with the CH (and the BS) by computing H(H(Ai )||H(m)), with m the
message to be sent including a counter/random/timestamp in order to ensure random-
j j
ness. The message, Bi ||H(H(Ai )||H(m)) will unambiguously authenticate the CN with
the CH and/or BS. Only in case of a problem, the situation is communicated in the
group.
consecutive order. If this order is not respected or the authentication check of a node
j
Li belonging to that group mentioned in the message is unsuccessful, doubts are sent
to the CH and BS in unicast mode. Consequently, each message is checked by a part
of the nodes belonging to the cluster and it is assumed that no more than 3 nodes
are malicious.
3.6.1 Capture of CN
First, it should be mentioned that the derivation by a CN of an individual cluster key,
j
pairwise key, and group node key is only possible if the key ki is known. Consequently,
the focus of protection (e.g. using techniques of code obfuscation for example) should
be put on this value.
Let us now suppose that the CN is captured or compromised. This has the following
consequences.
– No further pairwise keys and individual cluster keys are allowed to be derived with
the captured or compromised node.
– The group node key and the network key are known. Consequently, no information
in the global network can be secured with the network key and in the local network
with the group node key.
– Also H(Kn ) can be derived. This value is used to establish group node keys in all
other clusters. Consequently, from the moment H(Kn ) is leaked, a node that wants
to securely share the group node key with a new cluster needs to use its individual
cluster key. Note that H(Kn ) is also used to derive the pairwise key between two CNs
without involvement of the CH.
Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks 79
To summarize, inside the infected cluster only existing pairwise keys and individual
cluster keys, different from the captured node, remain secure. Using the multicast key,
the infected node can be excluded. In the other not infected clusters, only existing group
node keys, pairwise keys and individual cluster keys remain secure. A group key cannot
be updated using a broadcast message of the CH.
Consequently, the first step to execute by the BS is to share the information on the
compromised node by broadcast communication in an authenticated way. Next, in order
to make the system fully functional again, the BS should update the value Kn and kn . In
practise, it means that first all CNs should receive an updated version of both kn and
j j
H(Kn ), allowing them to update the values Ci and Di . Also the CHs should receive an
updated value of kn and H1 = H(IDj ||H(Kn )). Since the shared key between BS and each
CN and CH is not leaked, the updated info can be communicated using unicast com-
munication to each entity. Fortunately, this situation will be very rare.
3.6.2 Capture of CH
We can assume that this situation is very unlikely as the CH is supposed to be a more
powerful device, possessing more possibilities to guarantee secure storage of the secret
parameters. However, if the CH is captured, H(Km ) is leaked and thus an attacker can
j j
create new valid combinations for Ai and Bi , thus creating fake nodes which cannot be
verified by legitimate CHs. However, they can be detected by the BS in case the BS is
storing the registered IDs of the CNs since the newly maliciously constructed Ai param-
eters do not involve the registered IDs. Note that the other CHs cannot create valid
individual cluster key or pairwise key requests, since they do not know H(Kn ), required
to build the message M1 from Equation 3.6. Moreover, the other nodes in the network
can still continue to communicate securely by using the key H(knj ||H(Kn )).
Consequently, the variable Km requires an update. The BS sends a message to all the
CHs by unicast communication using the current shared key kj between CH and BS,
containing an updated version of H(Km ) and kj = H(Km ||IDj ). Also for each node, the
j j j j j
new versions of Ai , Bi , Ci , Di , ki should be calculated by the BS and the update values for
j j j j j
Bi , Ci , Di , ki should be sent to the CN using unicast communication with the old ki .
Finally, it must be said that when a malicious CN and CH collaborate, the two main
important secrets H(Kn ) and H(Km ) are revealed and thus require a complete update.
However, the knowledge of these both secrets, still do not reveal the individual shared
j
keys ki for CNs and kj for CHs with the BS.
with the newly received values of Cj′ . Once the node receives this new information, it
can participate to all other phases in the cluster with CH, Cj′ , in order to derive the
other different keys.
3.8 Efficiency
As explained in Section 3.2, LEAP can be considered as the only complete key man-
agement system based on symmetric key operations. Let us compare the efficiency
of the proposed key management scheme with LEAP for the features: number of
communication phases to install the different keys, storage requirements, and packet
fragmentation.
Table 3.1 Comparison of number of communication phases between SAK and LEAP
3.9 Conclusions
This chapter describes the SAK protocol, which is a complete protocol to establish
the key management for all possible types of communications in an hierarchical
three-layered wireless sensor network. Confidentiality, integrity, and authentication are
obtained using symmetric key cryptography for all entities in the network.
We compare our protocol with the LEAP protocol and show that the number of com-
munication phases for most of the keys in SAK is lower, the generation of the keys is
more flexible and ad hoc, the storage requirements are less severe and smaller, and the
packet fragmentation is also reasonable.
Acknowledgement
This work is supported by the TETRA grant of the Flanders agency for Innovation by
Science and Technology, and the Short Term Scientific Mission performed under COST
Action IC1303.
References
1 Needham, R. and Schroeder, M. (1978). Using encryption for authentication in large
networks of computers. Communications of the ACM 21 (12): 993–999.
2 Lowe, G. (1995). An attack on the Needham-Schroeder public key authentication
protocol. Information Processing Letters 56 (3): 131–136.
3 Tbatou, Z., Asimi A., Asimi, Y. et al. (2015). V5: Vulnerabilities and perspectives.
Third World Conference on Complex Systems (WCCS), Marrakech, Morocco (23–25
November 2015). IEEE.
4 Braeken, A. (2015). Efficient Anonym Smart Card Based Authentication Scheme for
Multi-Server Architecture. International Journal of Smart Home 9 (9): 9.
5 Braeken, A., Porambage, P., Stojmenovic, M. et al. (2016). eDAAAS: Efficient dis-
tributed anonymous authentication and access in smart homes. International Journal
of Distributed Sensor Networks 12 (12).
6 Kumar, P., Braeken, A., Gurtov, A. et al. (2017). Anonymous secure framework in
connected smart home environments. IEEE Transactions on Information Forensics
and Security 12 (4): 968–979.
7 Xiao, Y., Rayi, V.K., Sun, B. et al. (2007). A survey of key management schemes in
wireless sensor networks, Science direct. Computer Communications 30 (11–12):
2314–2341.
8 Bala, S., Sharma G. and Verna, A.K. (2013). Classification of Symmetric Key Man-
agement Schemes for Wireless Sensor Networks. International Journal of Security
and Its Applications 7 (2): 117–138.
9 Chen, C.-Y. and Chao, H.-C. (2014). A Survey of Key Distribution in Wireless Sensor
Networks. Security and Communication Networks 7 (12): 2495–2508.
84 IoT Security: Advances in Authentication
10 Das, S.R., Perkins, C.E. and Royer, E.M. (2000). Performance comparison of two
on-demand routing protocols for ad hoc networks. Proceedings of the 19th Annual
Joint Conference of the IEEE Computer and Communications Societies (INFOCOM
2000) Tel Aviv, Israel (26–30 March 2000) IEEE.
11 Gupta, P. and Kumar, P.R. (2000). The capacity of wireless networks. IEEE Transac-
tions on Information Theory 46 (2): 388–404.
12 Zhu, S., Setia, S. and Jajodia, S. (2003). LEAP: Efficient Security Mechanisms for
Large-Scale Distributed Sensor Networks. Proceedings of the Tenth ACM conference
on Computer and Communications Security, Washington, DC, USA (25–29 October
2004). ACM.
13 Durresi, A., Bulusu, V., Paruchuri, V. et al. (2006). WSN09-4: key distribution in
mobile heterogeneous sensor networks. Proceedings of the IEEE Global Telecom-
munications Conference (GLOBECOM 2006), San Francisco, USA (27 November–1
December 2006). IEEE.
14 Hussain, S., Kausar, F. and Masood, A. (2007). An efficient key distribution scheme
for heterogeneous sensor networks. Proceedings of the International Wireless Com-
munications and Mobile Computing Conference (IWCMC 2007), Hawaii, USA (12–16
August 2007). ACM.
15 Ou, G., Huang, J. and Li, J. (2011). A Key-Chain Based Key Management Scheme
for Heterogeneous Sensor Network, pp. 358–361. https://www.researchgate.net/
publication/224212208_A_key-chain_based_key_management_scheme_for_
heterogeneous_sensor_network/citation/download (accessed 25 June 2019).
16 Zhang, Y., Shen, Y. and Lee, S.K. (2010). A Cluster-Based Group Key Manage-
ment Scheme for Wireless Sensor Networks. 12th International Asia-Pacific Web
Conference, Busan, Korea (6–8 April 2010).
17 Li, L. and Wang, X. (2010). A high security dynamic secret key management scheme
for Wireless Sensor Networks. Third International Symposium on Intelligent Informa-
tion Technology and Security Informatics, Jian, China (2–4 April 2010). IEEE.
18 Shnaikat, K.N. and Qudah, A.A.A. (2014). Key management techniques in wireless
sensor networks. International Journal of Network Security and Its Applications
(IJNSA) 6 (6),6.
19 Smeets, R., Aerts, K., Mentens, N. et al. (2014). A cryptographic key management
architecture for dynamic 6LowPan networks. Proceedings of the 9th ICAI, Eger,
Hungary (1 February 2014).
20 Butun, I., Morgera, S.D., and Sankar, R. (2014). A Survey of Intrusion Detection
Systems in Wireless Sensor Networks. IEEE Communications Surveys and Tutorials
16 (1): 266–282.
21 Lamport, L. (1981). Password authentication with insecure communication. Commu-
nications on the ACM 24 (11): 770–772.
22 Alarifi, A. and Du, W. (2006). Diversify sensor nodes to improve resilience against
node compromise. Proceedings of the fourth ACM workshop on Security of ad hoc
and sensor networks, Alexandria, USA (30 October 2006). ACM.
23 Collberg, C., Thomborson, C. and Low, D. (1997). A taxonomy of obfuscating trans-
formations. Computer Science Technical Reports 148.
85
Abstract
Elliptic curve cryptography (ECC) is extensively applied in various security protocols for
authentication and key management. ECC is a public key or asymmetric key cryptographic
approach which is based on elliptic curve theory. ECC was introduced to minimize compu-
tational costs while providing equal and faster layers of security than other familiar oper-
ations (such as modular exponentiation) and with smaller keys. The technique of ECC has
numerous applications in authentication protocols concerning RFIDs, digital signatures,
wireless sensor networks, smart cards, and other authentication techniques. In this chapter,
we describe the utilization of ECC for designing security protocols in terms of authentica-
tion, key establishment, signcryption, and secure group communication.
16000
14000 ECC
RSA
12000
10000
Key size (bits)
8000
6000
4000
2000
0
80 100 120 140 160 180 200 220 240 260
Security level or Symmetric key size (bits)
Figure 4.1 Comparison of key sizes of ECC and RSA for different security levels [11].
4.1.1 Notations
While designing ECC algorithms, the Elliptic Curves (ECs) are defined over a finite
field by an equation using two variables with coefficients, which are the elements of the
finite field [11]. Consequently, all the variables, coefficients and curve points fall below
the same finite abelian group, G. The resultant points of the curve operations are also
restricted in the same abelian group. A special point 0, known as the zero element or
point of infinity, is considered the identity element of the group. ECC is formulated with
EC point addition, point scalar multiplication and, additive and multiplicative inverses
on ECs over prime integer fields or binary polynomial fields. Modulo arithmetic is the
foundation for all the EC point operations. The implementation of ECC on WSNs is per-
formed over prime integer fields, since binary polynomial field operations are too costly
for low-power sensors.
We consider the ECs defined over prime fields Zp , where p is a large prime number.
The variables and coefficients will have the values between 0 and p − 1 and calculations
Public Key Based Protocols – EC Crypto 87
are performed in modulo p. Let a, b ∈ Zp and 4a3 + 27b2 ≠ 0. Then the EC is defined as;
y2 mod p = (x3 + ax + b)mod p (4.1)
Once p, a, and b are selected, a group of EC points Ep (a, b) are defined so they satisfy
Equation 4.1. Then a base point generator G = (x1 , y1 ) is chosen so that the order of G
is a very large value n and n ∗ G = 0. The key building block of ECC is the scalar point
multiplication which is Q = k ∗ P, where k is a positive integer and P and Q are points in
the EC. The value k ∗ P is computed by adding point P for k − 1 times and the resulting
point Q is obtained. However, the recovery of k, knowing the points P and Q is a hard
or computationally infeasible problem which is known as the Elliptic Curve Discrete
Logarithmic Problem (ECDLP). In real-time applications k is made large in order to
overcome guessing and brute force attacks.
Nevertheless, ECC is still not a widely deployed cryptographic scheme and its the-
oretical foundation is not very popular in standardized protocols. On the other hand,
many ECs are already patented which makes it far more challenging to define new ones.
Weak random number generators may also lead to successful attacks and built-in traps
can be hidden behind bad-curve designs.
Table 4.1 Size comparison between ECC and RSA public key and certificates.
Certificate
Authority
(CA)
IoT Cloud
Link A CH
Cluster 1 GW GW
CH
Link B
Cluster 1
Cluster 2 CH
Network 1
CH
Link C Cluster 2
Network 2
Link D
User
Figure 4.2 Network architecture for device/user authentication and key establishment.
work are extended in [15] by using implicit certificates for authenticating devices and
users under the umbrella of IoT.
Using the schemes presented in [13] and [15], a pervasive authentication and key
establishment scheme is designed for IoT networks in [14]. The scheme is called as PAu-
thKey and uses ECQV implicit certificates. Figure 4.2 illustrates the considered network
architecture to design the protocols while considering four types of communication
links: Link A - between two sensor nodes in the same cluster; Link B - between two
sensor nodes in distinctive clusters and in the same network; Link C - between two sen-
sor nodes located in distinctive clusters and different networks; Link D - between a user
and a sensor node.
Check validity of U
Generate NU
Generate NCA
Certificate
CertU, s, NCA, MACK [CertU|| s || NCA]
Verify MAC
e = H(CertU)
dU = erU + s (mod n)
QU = dUG
Finished
QU = eCertU + QCA
Finished
using the common authentication key K, and sends those two along with the Certifi-
cate Request message.
Then CA verifies the MAC value and nonce NU to identify the integrity and the mes-
sage freshness. If both are successfully verified, CA generates a random number rCA ∈
[1, ..., n − 1], computes the certificate CertU = RU + rCA × G and private key reconstruc-
tion value s = erCA + dCA (mod n), where dCA is CA’s private key and e = H(CertU ).
Certificate message includes the certificate CertU , s, a random nonce NCA , and the
MAC on [CertU , s, NCA ].
If MAC and NCA are correct, U calculates e = H(CertU ) using the same hash function.
Then the node U can compute its own private key dU = erU + s (mod n) and public key
QU = dU × G.
Node U’s Finished message contains an encrypted message digest of previous
handshake messages using the requester public key QU . CA is also capable of computing
Public Key Based Protocols – EC Crypto 91
U’s public key QU ; QU = eCertU + QCA . The following derivation proves that both
equations give exactly the same QU as computed by node U.
QU = dU G
= (erU + s(mod n)) G
= (erU + erCA + dCA (mod n)) G
= e(rU + rCA (mod n)) G + dCA G (4.2)
= e(rU G + rCA G) + QCA
= e(RU + rCA G) + QCA
= eCertU + QCA
CA uses public key QU for encrypting previous messages and answers with the Fin-
ished message to complete the handshake of the pre-authentication phase. Finally, the
sensor nodes possess the security credentials to start secure communication with the
internal and the external network entities (i.e., end-users and sensor nodes).
Check validity of U
Generate NU
Generate NCA
Certificate
CertU, s, NCA, MACK [CertU || s || NCA]
Verify MAC
e = H(CertU)
dU = erU + s (mod n)
QU = dUG
Finished
QU = eCertU + QCA
Finished
We now shortly describe the security features of the signcryption scheme ASEC,
which is proposed in [5]. Next, the different steps of the scheme are described. We refer
to [5] for a more detailed analysis on the security and performance.
4.3.2 Scheme
The signcryption scheme consists of three different phases. The first phase is the key
generation of the private and public keys of the participants. The second part handles
the signcryption, executed by the sender. In the third phase, receivers perform the oper-
ations individually, which are referred to as the unsigncryption process.
– The private key of the sender is determined as dS = H(H(IDS ||r)dk G), and the corre-
sponding public key as QS = dS Qk = dS dk G.
– The private key of the receiver Uj is determined as dj = H(H(IDj ||r)dk G), and the cor-
responding public key as Qj = dj Qk = dj dk G. Let us consider that U = {U1 , … , Un }
contains the intended receivers of the message.
The private keys are securely delivered to the different participants in off-line mode.
The master public key is stored in each node. For each user Ui of the system, the val-
ues (IDi , Qi , H(IDi ||Qi )) are made publicly available and are independently checked on
changes by a third party.
4.3.2.2 Signcryption
The sender S selects the group of receivers U and looks up the corresponding identities
IDj and public keys Qj for j ∈ {1, … , n}. A check on the hash value H(IDj ||Qj ) is made to
guarantee the integrity and authenticity of the published data. Then the following steps
are performed.
4.3.2.3 Unsigncryption
Let Uj be a receiver of the message. Uj performs the following steps.
Signcryption Unsigncryption
10. First, the same h as the received one should be obtained. Next, the identity of the
sender is now checked by first requesting the public key QS belonging to IDS . Then
the equality s2 Qk + hQS = ks should be checked. If so, IDS possesses the public key
QS and its identity is verified.
The different steps of the signcryption and unsigncryption mode of ASEC are sum-
marized in Table 4.2.
Common EC parameters are embedded in all the network entities that participate in the
communication scenario. The initiator (I) is considered a main powered resource-rich
entity (e.g., gateway node) and has higher processing power and memory capacity than
the rest of the nodes in the multicast group. The initiator is also aware of the constitu-
tion of the group (i.e., knowing the identities of the legitimate nodes). The initiator is
supposed to know the public keys of all the nodes and vice versa. The sleeping patterns
of the nodes and path losses in the communication links are not being considered since
they are outwith the scope of the key objective of this paper. Therefore, it is assumed
that the members of the multicast group will eventually receive the initiator requests
and the rest of the messages without failures.
The adversary is able to eavesdrop the controlling messages exchanged between the
different entities in the scheme. He may fraudulently act as a legitimate intermediate
device during the key establishment between the initiator and the and the other nodes,
and launch MITM attacks. Alternatively, an adversary who is external or internal to the
network may re-transmit the previous key establishment messages to generate replay
attacks and interrupt the normal operations of the nodes. If the adversary captures a
node, he may uncover the secret group keys stored in that node. The initiator is consid-
ered to be honest and not to be captured as this device is more powerful.
4.4.2 Scheme
The message flow of multicast key establishment of the scheme is shown in Figure 4.5.
We note that the scheme exploits the concepts of ECIES to establish a shared secret key
among the multicast group.
Step 1: First, the size (n) and the composition of the multicast group U =
{U1 , U2 , … , U(n−1) } are determined by the initiator. Then a random value r is
generated, where R = rG. EC points Sj s are computed using r and the public keys
Qj of the group members: Sj = di Qj + R, where j = 1 to n − 1. Next, the EC point
Sj = (xj , yj ) is encoded into the point (uj , vj ) as follows: uj = h(xj ); vj = h(yj ). For each
node Uj , the value uj = {⊕i≠j ui } ⊕ vj is computed. The group key is then defined by
k = h(⊕i ui ). Denote P = (u1 || · · · ||un−1 ) and let Auth = h(k||R||P). The new multicast
message for group U is generated and transmitted by the initiator with the calculated
values (Auth, C, R, U, P). Additionally, the digital signature is appended to preserve
message authentication and integrity. Note that the same R value can also be reused as
the parameter R in the signature scheme (see e.g. Schnorr Signature scheme).
Step 2: When the sensor node Uj receives the broadcast message, initially, it checks
whether it is included in the multicast group U. Then the digital signature and the
counter C are checked. If both are correctly verified, Sj is computed using the received
random value R and the node’s private key dj : Sj = dj Qi + R. The EC point Sj is converted
to the point (uj , vj ) using the same encoding as in step 1. After that Uj can compute
k = h(uj ⊕ uj ⊕ vj ) and verify the integrity by checking if h(k||R||P) corresponds with
the received Auth value.
Step 3: Each sensor node should send an acknowledgement message Ackj = h(k, Qj )
to finish the handshake. Later, by verifying the acknowledgement message, the initiator
can ensure the authenticity of that particular group member and the accurate derivation
of group key k.
Public Key Based Protocols – EC Crypto 97
After three steps the shared secret key is known by the initiator and the other members
in the multicast group.
4.6 Discussion
Although ECC schemes guarantee a high level of security, they could still contain an
easily-exploitable vulnerability if they are applied without an additional level of protec-
tion. Therefore, an additional layer of protection needs to be added to assure complete
security towards clogging attacks. Moreover, there are other limitations of ECC schemes
due to the low degree of maturity of the techniques and less adaptability. These will also
create difficulties and challenges in practical deployments of ECC solutions. Security
of the ECC scheme is entirely dependant on the curve. As a result, poor curve designs
might hugely affect the security in entire systems. Despite the above discussed limita-
tions, as discussed in the previous sections, ECC is used in many security protocols for
numerous resource-constrained networking devices that require lightweight solutions.
Although, in this book chapter, we discussed some selected areas of ECC use cases, there
can be many other areas where it is applicable.
References
1 Explaining Implicit Certificates. Certicom cooperation. https://www.certicom.com/
content/certicom/en/code-and-cipher/explaining-implicit-certificate.html (accessed
25 June 2019).
2 SafeCurves: choosing safe curves for elliptic-curve cryptography. https://safecurves.cr
.yp.to (accessed 25 June 2019).
3 SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV). (2013).
Version 0.97. http://secg.org/sec4-1.0.pdf (accessed 25 June 2019).
4 Bernstein, D.J. (2018). Curve25519: New Diffie-Hellman speed records. International
Workshop on Public Key Cryptography. https://rd.springer.com/chapter/10.1007/
11745853_14 (accessed 25 June 2019).
5 Braeken, A. and Porambage, P. (2015). Asec: Anonym signcryption scheme based on
ecoperations. International Journal of Computer Applications 5 (7):90–96.
6 Hankerson, D., Menezes, A.J. and Vanstone, S. (2003). Guide to Elliptic Curve Cryp-
tography. Berlin, Heidelberg: Springer-Verlag.
7 Kothmayr, T., Schmitt, C., Hu, W. et al. (2013). Dtls based security and two-way
authentication for the internet of things. Ad Hoc Networks 11 (8): 2710–2723.
8 Liu, J., Xiao, Y. and Chen, C.P. (2012). Authentication and access control in the inter-
net of things. Distributed Computing Systems Workshops (ICDCSW), 2012 32nd Inter-
national Conference, Macau, China (18–21 June 2012). IEEE.
Public Key Based Protocols – EC Crypto 99
9 Miller, V.S. (1985). Use of elliptic curves in cryptography. Conference on the theory
and application of cryptographic techniques, Linz, Austria (April 1985). Springer.
10 Pang, L. and Li, H. (2013). nmibas: a novel multi-receiver id-based anonymous sign-
cryption with decryption fairness. Computing and Informatics 32 (3): 441–460.
11 Porambage, P. (2018). Lightweight Authentication and Key management of Wireless
Sensor Networks for Internet of Things. http://jultika.oulu.fi/files/isbn9789526219950
.pdf (accessed 17 July 2019).
12 Porambage, P., Braeken, A., Schmitt, C. et al. (2015). Group key establishment for
secure multicasting in iot-enabled wireless sensor networks. 2015 IEEE 40th Confer-
ence on Local Computer Networks (LCN), Washington, USA (26–29 October 2015).
IEEE.
13 Porambage, P., Kumar, P., Schmitt, C. et al. (2013). Certificate based pairwise key
establishment protocol for wireless sensor networks. 2013 IEEE 16th International
Conference on Computational Science and Engineering (CSE), Sydney, Australia (3–5
Decmber 2013). IEEE.
14 Porambage, P., Schmitt, C., Kumar, P. et al. (2014). Pauthkey: A pervasive authen-
tication protocol and key establishment scheme for wireless sensor networks in
distributed iot applications. International Journal of Distributed Sensor Networks 10
(7): 357430.
15 Porambage, P., Shmitt, C., Kumar, P. et al. (2014). Two-phase authentication protocol
for wireless sensor networks in distributed iot applications. Wireless Communi-
cations and Networking Conference (WCNC), Istanbul, Turkey (6–9 April 2014).
IEEE.
16 Stallings, W. (2010). Cryptography and Network Security: Principles and Practice, 5e.
Upper Saddle River, NJ: Prentice Hall Press.
101
5.1 Introduction
Post-quantum cryptography is an essential research topic which became more popular
since the start of research on quantum computing. Quantum computers are highly
powerful machines which take advantage of subatomic particles which exist in more
than one state at any time. Such machines are able to process information in an
incomparably faster time than the fastest computers. IBM and Google are the leading
companies in this race for the first quantum computer that will then be made publicly
available and extremely useful. The main feature of such a powerful computer is that
it will be able to perform calculations which are almost impossible to be simulated by
a conventional computer. A computer with this feature will ewasily be able to break
all of the current cryptographic constructions which have proven to be secure under
number-theoretical assumptions. A possible solution to this problem can be offered
by the following research fields which are assumed to be resistant against quantum
attacks:
– Hash-based Cryptography. A typical example for this field is given by the Merkle’s
hash-tree public-key signature scheme, which was introduced in 1979. While on the
one side hash-based cryptographic schemes offer an efficient solution to certain cryp-
tographic problems, the main disadvantage of those schemes is the large size of sig-
natures.
– Code-based Cryptography. McEliece’s hidden Goppa-code public-key encryption
represents a typical scheme of this research field. The scheme was introduced in 1979.
The main idea of such cryptosystems, which are based on error-correcting codes, is
to construct a secure and efficient one-way function.
– Lattice-based Cryptography. Another research topic of post-quantum cryptogra-
phy is given by the lattice-based cryptography which also has the feature of conjec-
tured quantum attacks resistance. Furthermore, lattice-based cryptoschemes profit
mostly from algorithmically simple and highly parallelizable constructions.
– Multi-variate quadratic equations Cryptography. Introduced in the 1980s, this
type of scheme represents asymmetric cryptography where the public keys are
defined as a set of multi-variate polynomials and the security of such schemes is
based on a problem of solving multi-variate quadratic equations over finite fields.
5.1.1 Organization
In Section 2, we will have a closer look into the main definitions of lattice-based cryp-
tography and introduce the reader to the solutions of certain essential problems in this
topic. In section 3, we discuss the main cryptographic primitives constructed from lat-
tices. In section 4 we show the relation between lattice-based cryptoschemes and IoT
and provide some examples for these relations.
5.2.1 Notations
Let ℤq = ℤ∕qℤ denote the quotient ring modulo q, where q ∈ ℤ+ is a positive integer.
Elements in ℤq are given as x + qℤ, with x ∈ ℤ. It holds that ℤq is an additive group sup-
porting scalar multiplication by integers, i.e. s ⋅ x ∈ ℤq for an integer s ∈ ℤ and x ∈ ℤq .
We use bold capital letters to denote matrices, such as A, B and bold lower-case letters
to denote column vectors, such as x, y. To indicate horizontal concatenation of vectors
and matrices we use the following notation: [A|Ax].
Lattice-Based Cryptography and Internet of Things 103
5.2.2 Preliminaries
5.2.2.1 Lattices
Let B = {b1 , … , bn } ⊂ ℝn be the basis of a lattice L which consists of n linearly indepen-
∑n
dent vectors. The n−dimensional lattice L is then defined as L = ℤbi .
i=1
The i-th minimum of lattice 𝛬, denoted by 𝜆i (L) is the smallest radius r such that L
contains√i linearly independent vectors of norms ≤ r. (The norm of vector bi is defined as
∑n
‖bi ‖ = c2i,j , where ci,j , j ∈ {1, … , n} are coefficients of vector bi . We denote by 𝜆∞
1 (L)
j=1
the minimum distance measured in the infinity norm, which is defined as ‖bi ‖∞ ∶=
max(|ci,1 |, … , |ci,n |). Additionally,
{ n we recall ‖B‖ = }max‖bi ‖ and its fundamental paral-
∑
lelepiped is given by P(B) = ai bi | a ∈ [0, 1)n . Given a basis B for a lattice L and a
i=1
vector a ∈ ℝn we define a mod L as the unique vector in P(B) such that a − (a mod L) ∈
L. If L is a lattice, its dual lattice is defined as
L∗ = {b̂ ∈ ℝn | ̂ b⟩ ∈ ℤ}.
∀b ∈ L, ⟨b,
The discrete Gaussian distribution over L with center c and parameter 𝜎 is given by
𝜌 (y)
𝒟L,𝜎,c (y) = 𝜌 𝜎,c(L) , ∀y ∈ L. The distribution 𝒟L,𝜎,c is usually defined over the lattice L =
𝜎,c
̃ ∶= {̃
– B b1 , … , ̃
bm } ⊂ ℝm is the Gram-Schmidt orthogonalization of the vectors
b 1 , … , bm .
̃
The Gram-Schmidt norm is denoted by ‖B‖.
Definition 5.1 (Shortest Vector Problem (SVP)) Given an arbitrary basis B of some
lattice L = L(B), find a shortest non-zero vector v ∈ L for which holds ‖v‖ = 𝜆1 (L).
Apart from the main definition of the SVP problem, there are many approximation
problems which are parameterized by an approximation factor 𝛾 ≥ 1 which is repre-
sented as a function in the lattice parameter n, i.e. 𝛾 = 𝛾(n). The corresponding approx-
imation problem for the SVP problem is defined as follows:
It is known that many cryptoschemes can be proved secure under the hardness of
certain lattice problems in the worst case. But there is no known proof for the search
version of SVP𝛾 . But there are many proofs which are based on the following decision
version of approximate-SVP problem:
Special case (presented in [13]) of short integer solution (SIS) problem introduced
by Ajtai [3]. Another particularly important computational problem for cryptographic
constructions is the Bounded-Distance Decoding BDD𝛾 problem.
The main difference between BDD𝛾 and SVP𝛾 is the uniqueness of the solution to the
earlier problem, while the target of the latter can be an arbitrary point.
Most modern lattice-based cryptographic schemes rely on the following average-case
problems, Short Integer Solution (SIS) and Learning with Errors (LWE) problems, their
analogues defined over rings. They involve analytic techniques such as Gaussian prob-
ability distribution.
Definition 5.6 (Learning with Errors Problem (LWE)) For an integer q and error
distribution 𝜒, the goal of LWEq,𝜒 in n dimensions the problem is to find s ∈ ℤnq with
overwhelming probability, given access to any arbitrary poly(n) number of samples from
As,𝜒 for some random s.
In matrix form, this problem looks as follows: collecting the vectors ai ∈ ℤnq into a
matrix A ∈ ℤn×m
q and the error terms ei ∈ ℤ and values bi ∈ ℤq as the entries of the
m-dimensional vector b ∈ ℤm t
q we obtain the input A, b = A s + e mod q.
Definition 5.8 (Ring-SISq,n,m,𝛽 ) Let ℛ be some ring and 𝒦 some distribution over
ℛqn×m . Given a random matrix A ∈ ℛqn×m sampled from 𝒦 , find a non-zero vector v ∈
ℛqm such that Av = 0 and ||v||2 ≤ 𝛽.
5.2.4 State-of-the-Art
In this chapter we want to briefly survey some of the previous significant works in lat-
tice cryptography. The particularly ground-breaking work of Ajtai [3] provided the first
worst-case to average-case reductions for lattice problems. In that work, Ajtai intro-
duced the average-case short integer solution (SIS) and showed that solving it is at least
as hard as approximating various lattice problems in the worst case. In a later work [4],
Ajtai and Dwork presented a lattice-based public-key encryption scheme which became
the basic template for all lattice-based encryption schemes.
Almost at the same time, a concurrent work had been published by Hoffstein, Pipher,
Silverman [25] introducing the NTRU public-key encryption scheme. It was the first
construction using polynomial rings. The advantages of that construction are the prac-
tical efficiency and particularly compact keys. The NTRU system is parameterized by a
certain polynomial ring R = ℤ[X]∕(f (X)), where f (X) = X n − 1 for a prime n, or f (x) =
X n + 1 for n which is a power of two, with a sufficiently large modulus q, which defines
the quotient ring Rq = R∕qR.
Around the same time, Goldreich, Goldwasser and Halevi [20] published a paper on
public-key encryption scheme and a digital-signature scheme, both based on lattices.
The main idea behind their constructions was that a public key is a “bad” basis of some
basis consisting of long and non-orthogonal lattice vectors, while the secret key is a
“good” basis of the same lattice consisting of short lattice vectors.
Later on, Oded Regev [40] provided improvements to the results of Ajtai and Dwork’s
work by introducing Gaussian measures and harmonic analysis over lattices. The main
106 IoT Security: Advances in Authentication
consequences of these new techniques were simpler algorithms and tighter approxima-
tion factors for the underlying worst-case lattice problems. In another important work,
Regev [41] introduced the average-case learning with error (LWE) problems, for which
Oded Regev was awarded the Goedel Prize in 2018. In the same paper, the author intro-
duced a new cryptosystem which can be proved secure under the new LWE assumption.
This construction had the favourable feature of more efficient public keys, secret keys
and ciphertexts, where the efficiency of the former was improved from 𝒪(n4 ) to 𝒪(n2 )
and the ciphertext efficiency improved from 𝒪(n2 ) to 𝒪(n).
– Encryption algorithm takes as input, a message bit 𝜇 ∈ {0, 1} and a public key A, ̂
chooses a uniformly random x ∈ {0, 1} and generates the ciphertext c = A ⋅ x +
m ̂
(0, 𝜇 ⋅ ⌈q∕2⌉) ∈ ℤn+1q .
– Decryption algorithm uses the secret key s and computes (−s, 1)t ⋅ c = (−s, 1)t ⋅ A ̂ ⋅
x + 𝜇 ⋅ ⌊q∕2⌉ = e ⋅ x + 𝜇 ⋅ ⌊q∕2⌉ ≈ 𝜇 ⋅ ⌊q∕2⌉ mod q. The decryption is correct as
t
the polylogarithmic factors used in the [33] scheme, that construction appears not to
be practical in use. Therefore, the search for more efficient signatures lead to further
contributions. Lyubashevsky [32] presented the first approach of a three-move identifi-
cation scheme which can be converted into a non-interactive signature scheme applying
Fiat-Shamir characteristics, where the resulting scheme is defined in the Random Oracle
Model (ROM). In the following paragraph, we sketch the main idea of the lattice-based
identification protocol from [32] as it represents a basic tool for several cryptographic
constructions.
The prover’s secret key is given by a short integer matrix S ∈ ℤm×l and the correspond-
ing public key is B = A ⋅ S ∈ ℤn×l for a given public parameter A ∈ ℤn×m . The interactive
protocol consists of the following steps:
1. The prover chooses a “somewhat short” vector v ∈ ℤm and sends y = A ⋅ v to the
verifier.
2. The verifier chooses a random challenge c ∈ ℤl being a short vector and sends it to
the prover.
3. The prover computes u = S ⋅ c + v
4. The prover decides whether to accept or to reject u. This procedure is called rejection
sampling and is better explained in the next paragraph.
5. If the prover accepts u and sends it to the verifier, the latter checks A ⋅ u = B ⋅ c + y
and that y is sufficiently short.
We recall the very first lattice-based PRF from [8] based on LWE problem. This
construction is particularly randomness-efficient and practical. The function is
given by a rounded subset product. Let {Si }i∈[l] be a set of secret keys given as
short Gaussian-distributed matrices, an uniformly random vector a ∈ ℤq . Then, the
lattice-based PRF is given by the following function:
∏
l
x
Fa,{Si } (x) = ⌊atr ⋅ Si i ⌉p
i=1
An important feature of key homomorphism for lattice-based PRFs has been introduced
by Boneh et al. [10]. The authors provided the first standard-model construction of
key-homomorphic PRF secure under LWE assumption. This additional property plays
a significant role in distributing the function of key generation center, as it satisfies the
following function Fk1 (x) + Fk2 (x) = Fk1 +k2 (x), for different secret keys k1 , k2 .
Furthermore, some other more advanced constructions have been developed in the
last decade. These are:
To multiply two ciphertexts, we use the mathematical construct called tensor product
c1 ⊗ c2 ∈ ℤnq , which is an encryption of 𝜇1 ⋅ 𝜇2 , under the secret key s ⊗ s. Here also,
2
the number of multiplication factors is bounded from the beginning. One of the main
drawbacks of homomorphic encryption is that it always increases the error rate of a
ciphertext. In the same paper [12], the authors introduced a technique to improve this
issue, which is called ‘key switching technique’. This technique allows the conversion of
a ciphertext that encrypts some message 𝜇 into another ciphertext, that still encrypts the
same message, but under some different secret key s′ and uses the previously introduced
gadget trapdoor. For further details we refer to the original paper.
Another idea for the solution, called bootstrapping, was introduced by Gentry [17].
The idea involves a technique which reduces the error rate of a ciphertext and allows
unbounded homomorphic computation. The technique is to homomorphically evaluate
the decryption function on a low-error encryption of the secret key, which represents a
part of the public key.
An alternative scheme of homomorphic encryption was introduced by Gentry et al.
[19] in 2013 which has some attractive properties. In order to perform homomorphic
evaluations of the ciphertext, no key-switching technique is required. The scheme [19]
can also be adapted to an identity-based-encryption or an attribute-based encryption.
An extension of these schemes was proposed by [27], defining identity-based encryption
and attribute-based encryption schemes in multi-identity and multi-authority settings,
respectively.
modulo q. This syndrome is used in combination with the public key A to represent
a user-specific public key pkid ∶= Aid = [A|yid ].
– Next, to extract a secret key for the above-mentioned identity string id, we use a
trapdoor to run the Gaussian sampling algorithm as defined in [18]. The algorithm
samples from a discrete Gaussian over an n-dimensional lattice 𝛬. Discrete Gaussians
over lattices, are useful mathematical tools to study the complexity of lattice problems
[35]. To sample from a discrete Gaussian the algorithm takes the parameters c, 𝜎, as
input representing the standard deviation and the center of a distribution DL,𝜎,c . It also
takes as input a trapdoor basis B of the lattice L⟂yid (A) and outputs a lattice vector as
long as the length of all the Gram-Schmidt (see Definition of Gram-Schmidt Norm in
Section 2.2) vectors of basis B are exceeded by the standard deviation parameter. The
Gaussian-distributed solution of key extraction is given by the vector xid such that
the following equation holds: A ⋅ xid = yid . The secret key xid solves also the equation
Aid ⋅ (−xid , 1) = 0.
– To encrypt a message bit 𝜇 = {0, 1} using identity id as a public key, the encryptor
uses the technique of dual LWE scheme, the given user-specific public key Aid and
computes the ciphertext as ctid ≈ st ⋅ A + (0, 𝜇 + ⌊q∕2⌉)t . The corresponding decryp-
tion of this ciphertext is computed using the user’s secret key xid as follows: ctid ⋅
(−xid , 1) ≈ 𝜇 ⋅ ⌊q∕2⌉.
An IBE scheme which is defined in the standard model, was later defined by Cash
et al. [14]. In the same work, the authors provided a construction of an hierarchical
identity-based encryption (HIBE) which allows any user to use their secret key in a
secure way to delegate it to any subordinate user in hierarchy.
An ABE scheme arbitrary for any predicates represented as a priory bounded depth
circuits based on a Lattice assumption was proposed by Gorbunov et al. [22]. The secret
key in this scheme grows proportionally to the size of the circuit. An improvement of
this scheme was later proposed by Boneh et al. [9].
5.5 Conclusion
Our main target in this contribution was to provide a general overview of lattice-based
primitives and to summarize how these constructions can be applied to IoT. We
first introduced the reader to the complex notions of lattice-based cryptography, yet
tried to avoid details which are too specific for the concept of this chapter. Then,
using these notions, we provided a summary of lattice-based constructions. Finally,
in the last section, we reviewed the state-of-the-art applications of cryptographic
primitives to the IoT systems, where most of the existing applications are based on
classical number-theoretic assumptions, we want to catch the reader’s attention to
the importance of a switch to quantum-resistant constructions, where lattice-based
constructions provide a powerful solution.
References
1 Agrawal, S., Boneh, D. and Boyen, X. (2010). Efficient lattice (H)IBE in the standard
model. In: Advances in Cryptology –EUROCRYPT 2010. Lecture Notes in Computer
Science, Vol. 6110 (ed. H. Gilbert), 553–572. Berlin, Heidelberg: Springer.
2 Agrawal, S., Freeman, D.M. and Vaikuntanathan, V. (2011). Functional encryption
for inner product predicates from learning with errors. Advances in Cryptology
-CRYPTO 2011, Proceedings. Santa Barbara, USA (14–18 August 2011). Springer.
3 Ajtai, M. (1996). Generating hard instances of lattice problems (extended abstract).
STOC ’96 Proceedings of the twenty-eighth annual ACM symposium on Theory of
Computing, Philadelphia, USA (22–24 May). ACM.
4 Ajtai, M. and Dwork, C. (1997). A public-key cryptosystem with
worst-case/average-case equivalence. STOC ’97 Proceedings of the twenty-ninth
annual ACM symposium on Theory of computing, El Paso, USA, (04–06 May 2019).
ACM.
5 Alekhnovich, M. (2003). More on average case vs approximation complexity. 44th
Symposium on Foundations of Computer Science (FOCS 2003), Cambridge, USA
(11–14 October 2003). IEEE Computer Society.
6 Alkim, E., Ducas, L., Pöppelmann, T. and Schwabe, P. (2016). Post-quantum key
exchange a new hope. USENIX Security Symposium. https://www.usenix.org/system/
files/conference/usenixsecurity16/sec16_paper_alkim.pdf (accessed 25 June 2019).
7 Alkim, E., Jakubeit, P., and Schwabe, P. (2016). New hope on arm cortex-m. Inter-
national Conference on Security, Privacy, and Applied Cryptography Engineering,
Hyderabad, India (14–18 December 2016). Springer.
116 IoT Security: Advances in Authentication
8 Banerjee, A., Peikert, C. and Rosen, A. (2012). Pseudorandom functions and lattices.
Advances in Cryptology. EUROCRYPT 2012. Proceedings, Cambridge, UK (15–19
April 2012). Springer.
9 Boneh, D., Gentry, C., Gorbunov, S. et al. (2014). Fully key-homomorphic encryp-
tion, arithmetic circuit ABE and compact garbled circuits. Advances in Cryptology -
EUROCRYPT 2014 - Proceedings, volume 8441 of Lecture Notes in Computer Science,
Copenhagen, Denmark (11–15 May 2014). Springer.
10 Boneh, D., Lewi, K., Montgomery, H.W. and Raghunathan, A. (2013). Key homo-
morphic prfs and their applications. Advances in Cryptology - CRYPTO 2013.
Proceedings, Part I, volume 8042 of Lecture Notes in Computer Science, Santa
Barbara, USA (18–22 August 2013). Springer.
11 Bos, J.W., Costello, C., Naehrig, M. and Stebila, D. (2015). Post-quantum key
exchange for the tls protocol from the ring learning with errors problem. 2015
IEEE Symposium on Security and Privacy (SP), San Jose, USA (17–21 May 2015).
IEEE.
12 Brakerski, Z. and Vaikuntanathan, V. (2011). E_cient fully homomorphic encryption
from (standard) LWE. IEEE 52nd Annual Symposium on Foundations of Computer
Science, Washington, USA (22–25 October 2011). IEEE Computer Society.
13 Brakerski, Z. and Vaikuntanathan, V. (2015). Constrained key-homomorphic prfs
from standard lattice assumptions - or: How to secretly embed a circuit in your
PRF. Theory of Cryptography - Proceedings, Part II, volume 9015 of Lecture Notes in
Computer Science, Warsaw, Poland (23–25 March 2015). Springer.
14 Cash, D., Hofheinz, D., Kiltz, E. and Peikert, C. (2010). Bonsai trees, or how to dele-
gate a lattice basis. EUROCRYPT 2010, volume 6110 of LNCS, French Riviera, France
(30 May–3 June 2010). Springer.
15 Ducas, L., Durmus, A., Lepoint, T. and Lyubashevsky, V. (2013). Lattice signatures
and bimodal gaussians. Advances in Cryptology - CRYPTO 2013 - 33rd Annual
Cryptology Conference, Santa Barbara, USA (18–22 August 2013). Springer.
16 El Kaafarani, A. and Katsumata, S. (2018). Attribute-based signatures for unbounded
circuits in the ROM and e_cient instantiations from lattices. Public-Key Cryptog-
raphy - PKC 2018, Proceedings, Part II, Rio de Janeiro, Brazil (25–29 March 2018).
Springer.
17 Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proceedings of
the 41st Annual ACM Symposium on Theory of Computing, STOC, Bethesda, USA
(31 May–2 June 2009). ACM.
18 Gentry, C., Peikert, C. and Vaikuntanathan, V. (2008). Trapdoors for hard lattices
and new cryptographic constructions. STOC 08’ Proceedings of the fortieth annual
ACM symposium on Theory of computing, Victoria, Canada (17–20 May 2008).
ACM.
19 Gentry, C., Sahai, A., and Waters, B. (2013). Homomorphic encryption from learning
with errors: Conceptually simpler, asymptotically faster, attribute based. Advances in
Cryptology –CRYPTO 2013, Santa Barbara, USA (18–22 August 2013). Springer.
20 Goldreich, O., Goldwasser, S, and Halevi, S. (1997). Public-key cryptosystems from
lattice reduction problems. Advances in Cryptology - CRYPTO ’97, 17th Annual
International Cryptology Conference, Santa Barbara, USA (17–21 August 1997).
Springer.
Lattice-Based Cryptography and Internet of Things 117
Part III
Abstract
Multi-access edge computing (MEC) is an evolving paradigm of the Internet of things (IoT)
applications. The MEC is a complement to traditional cloud computing where services are
extended closer to the network and so to the end users. As mobile users can use MEC
services in an inter-domain, security is one of the challenging questions, how to protect
IoT applications in MEC environments from abuses? In addition, considering real-world
MEC supported IoT applications (e.g. airport) where a user is always on the move from one
network to another network. This scenario also poses many security challenges. To mit-
igate this, an authentication mechanism can play an important role to defend MEC from
unauthorized access. Thus, an authentication mechanism is needed that can support mobil-
ity for MEC users. Moreover, establishing a session key is also highly desirable between
the MEC users and foreign-edge servers to enable secure communication in MEC envi-
ronments. In addition, how to maintain users’ anonymity is another important security
requirement, as MEC users do not want to disclose their private information. To solve these
issues, this chapter proposes a new efficient and anonymous mobility supported mutual
authentication scheme in MEC environments. The scheme utilizes the password and smart-
card as two-factor authentications and facilitates many services to the users such as user
anonymity, mutual authentication, and secure session key establishment in mobility sup-
ported environments. In addition, it allows users to choose/update their password regularly,
whenever needed. Security and performance evaluation show the practicality of the pro-
posed scheme.
Keywords multi-access edge computing; internet of things; authentication; secure mobility
6.1 Introduction
Multi-access edge computing (MEC) is one of the new paradigms in the internet
of things (IoT) applications [1]. Following [2], many billions of devices are going
to be deployed and connected via the Internet to support many of the real-world
IoT and cyber physical applications. In IoT applications, several low-cost sensors
or smart objects aggregate data from their respective environments and send it to
cloud servers, where the data will be processed and analyzed for further analysis of
the applications. In this scenario, indeed cloud computing technology has shown its
efficiency as it has enormous data processing, high-computational power, and data
storage and so on. However, in many IoT applications (e.g. IoT-healthcare, airport,
etc.), the security of such traditional cloud computing can become debatable when the
processed data grows significantly as it will suffer more latency. That can result in a
lack of efficiency, which is challenging in such traditional cloud environments. In other
words, as more and more IoT devices are involved in people’s lives, the traditional
cloud architecture can barely meet their requirements of mobility support, location
awareness, and low latency. Thanks to the new paradigm, i.e. MEC, has been brought
in recently to solve the problem of traditional cloud computing. In MEC, traditional
cloud computing responsibilities are extended closer to the edge of the network and so
to the end users [2]. Therefore, with the new paradigm, an edge node is responsible for
performing all the operations (e.g. computation, communication, and storage) closer to
the end user by pooling networks’ local resources. As shown in Figure 6.1, traditional
cloud services are extended closer to the MEC layer, where edge nodes can host the
end users and the resource-constrained IoT devices (e.g. wireless sensor network). Such
multi-layered network models allow distributed computing to run as close as possible
to the sensor network and to the end users. This multilayered network model can
support a wide range of distributed applications, e.g. IoT-healthcare [3], IoT-airports
[4], smart vehicular network [5], etc.
With the new MEC paradigm, the prospect of new challenges appears. Security is
one the main concerns including privacy. For instance, consider an end user, who owns
a local private cloud and would like to turn the local private cloud into the edge node
as a server and lease spare resources from the local private cloud. This feature raises
trust issues in a multilayered MEC network and makes it is one of the most important
challenges of such a network model. In addition, as the end user moves its topology
Cloud Computing
Edge node
Cloud Layer
Edge node # 2
Edge node # 1 Edge node #n
MEC Layer
End
users
and path changes regularly, as shown in Figure 6.1. In such settings, an attacker can
counterfeit a rogue edge node in the network and pretend to be a legitimate edge node.
Therefore, authentication is vital when a user is on the move in an MEC network.
In a system or network, an adequate authentication is the first measure that can verify
users’ identities. To achieve this, several schemes have been proposed, e.g. Imine et al.
[6], Amor et al. [7], and the schemes proposed in [8, 9]. Most of these approaches, incur
a high amount of computation overhead to perform device authentication. Moreover,
most of these schemes do not support the mobility, except the scheme proposed in [8].
In addition, several authentication mechanisms have been proposed for the traditional
multiserver environments in Hassan et al. [10], Han and Zhu [11], Tseng et al. [12], and
Irshad et al. [13]. However, the scheme proposed in [11, 12] is vulnerable to many attacks
as pointed out in [10, 14].
In this chapter, we design a new, efficient and anonymous mobility supported mutual
authentication scheme for use in MEC environments. We present a secure mobility
use-case, where various MEC nodes are deployed and a user is on move (e.g. from one
network to another) within an airport setting [8]. The proposed scheme utilizes the
password and smartcard (SC)-based approach. Our approach not only performs ade-
quate authentication, but it also establishes a secure session-key between two end parties
between all the communicating entities. Moreover, the proposed provides paramount
and robust security services to the patient (i.e. a mobile node). Our preliminary analy-
sis shows that our scheme is feasible for MEC environments where mobility is in high
demand, for example, an airport, in-hospital, etc.
The rest of the chapter is organized as follows. Section 6.2 discusses the related work,
and Section 6.3 describes the network model adversary model. The proposed scheme is
discussed and presented in Section 6.4. Security analysis and performance evaluation,
and conclusion are presented in Sections 6.5 and 6.6, respectively.
scheme incurred a high computation cost, as it has utilized the public key encryption
and decryption operations, which are expensive for low-powered IoT devices.
In [8], the author proposed a secure and efficient mutual authentication scheme for the
edge-fog-cloud network architecture that mutually authenticates fog users at the edge
of the network. The scheme proposed in [8] also supports mobility to the fog users.
The main idea of the scheme is to utilize a long-lived master secret key, allowing a fog
user to communicate and authenticate with any of the fog servers in the network when
a user is on the move. However, the master key is stored in the form of plain text in
the SC, therefore, brute-force guessing, and SC stolen attacks may jeopardize the whole
network.
In [10], a new unconditional anonymity identity-based user-authenticated key agree-
ment scheme for an IoT multi-server environment is introduced by Hassan et al. The
authors utilized a ring signature mechanism to allow users to anonymously authenticate
themselves in the multiserver environments. However, the computation costs are sig-
nificantly high. Han and Zhu [11] proposed a new identity-based mutual authentication
protocol without bilinear pairings to improve the performance.
Tseng et al. [12] proposed a user authentication and key agreement protocol based
on identity-based cryptosystem. They claimed that their protocol resists the ephemeral
secret leakage (ESL) attacks in mobile multiserver environments. Furthermore, their
protocol requires the lowest communication overhead. However, in [10], Hassan et al.
pointed out that the Tseng et al. scheme does not provide anonymity.
Irshad et al. proposed an enhanced and provably secure chaotic map-based authen-
ticated key agreement in multiserver architecture [13]. The authors claimed that their
approach provides many security properties, e.g. mutual authentication and provides
security against many attacks, e.g. replay attack, impersonation attack, known-key
attack, and offline guessing attacks. However, in [14], Wu et al.’s pointed out that the
scheme in [13] is susceptible to many attacks, e.g. offline password-guessing.
However, from the above-mentioned schemes, it can be noted that most of schemes
are either vulnerable to security attacks or require high-computational complexities.
6.4.1 System Setup for the Edge Nodes Registration at the Registration
Center
This phase invokes offline, the RC generates and assigns a unique identity for each edge
node, i.e. IDEi . (here, i is 1,2,..n; and n is number of the edge nodes). Then, it generates a
pool of keys for the edge nodes, i.e. KPE, of KEi keys and the corresponding key index
KidxE . Note that there should not be a common key (KEi ) in the pool KPE, as follows,
KEi ∩ KEj = Ø and i ≠ j. The RC loads in each an edge node unique key KEi and its key
index KidxEi . As edge nodes are resource rich and temper-proof nodes, each edge node
is preloaded with the master key (Z = h(MEC K )) and the indexes of the keys, which are
Notations Descriptions
idUi , idHEN , and idFEN Identities of a user (U), home edge node (HEN), and
foreign edge node (FEN)
PW Ui Password of user U.
KPE, KidxEi A pool of keys for the edge nodes, i.e. KPE, along with
key indexes
MEC K Master key for the edge nodes
EK [M] M is encrypted (E) with symmetric Key K
DK [M] M is decrypted (E) with symmetric Key K
h() One-way hash function
HMAC{M} Hashed-Message authentication code on message M
||, Concatenation operation
⊕ Ex-or operation
126 IoT Security: Advances in Authentication
assigned to the deployed neighboring edge nodes. Note that the key index will be used
to determine the address of a HEN when a user is visiting to the FEN (i.e. other edge
node).
for secure communication between the user and FEN. Generates π = ESKey [r||t4] and
sends {π, t4} to the user.
Step 7. Upon receiving the message from FEN, the user first checks the validity of
timestamp (t5 − t4) ≤ ΔT, if it is true then goes to next step. Now, it computes
SKey * = (h(h(idUi )||idHEN ||idFEN ||r||t1||t4)) and decrypts π and obtains r* and t4*. The
user verifies, r* = r and t4* = t4. If yes, then the user believes that FEN is a legitimate
node, otherwise not.
S1: Mutual authentication, S2: session key establishment, S3: User anonymity, S4:
Replay Attacks, S5: Impersonation Attacks, S6: Insider Attacks, S7:
Man-in-the-Middle, S8: Offline-Password/Key Guessing.
6.6 Conclusion
The MEC is an emerging paradigm in the IoT world. Mobile users can use MEC services
in an inter-domain when they are on move. We designed a new, efficient and anonymous
mobility supported mutual authentication scheme in MEC environments. The scheme
utilized the two-factor approach in MEC. The proposed scheme can facilitate several
services to the users such as user anonymity, mutual authentication, secure session key
establishment, mobility support, and it also allows users to choose/update their pass-
word regularly.
References
1 Taleb, T., Samdanis, K., Mada, B. et al. (2017). On multi-access edge computing: a
survey of the emerging 5G network edge cloud architecture and orchestration. IEEE
Communications Surveys & Tutorials 19 (3): 1657–1681.
2 Porambage, P., Okawuibe, J., Liyanage, M. et al. (2018). Survey on multi-access
edge computing for internet of things realization. IEEE Communications Surveys &
Tutorials 20 (4): 2961–2991.
3 Rahmani, A., Gia, T.N., Negash, B. et al. (2018). Exploiting smart e-health gateway at
the edge of health internet of things: a fog computing approach. Future Generation
Computer Systems 78 (2): 641–658.
4 Salix, A. and Mancini, G. (2017). Making use of a smart fog hub to develop new
services in airports. In: European Conference on Parallel Processing (Euro-Par 2017).
Santiago de Compostela, Spain (28–29 August 2017): Springer.
5 Hu, Q., Wu, C., Zhao, X. et al. (2018). Vehicular multi-access edge computing with
licensed Sub-6 GHz, IEEE 802.11p and mmWave. IEEE Access, Digital Object Identi-
fier https://doi.org/10.1109/ACCESS.2017.2781263.
6 Imine, Y., Kouicem, D.E., Lounis, A., and Bouabdallah, A. (2018). MASFOG: an effi-
cient mutual authentication scheme for fog computing architecture. In: 17th IEEE
International Conference on Trust, Security and Privacy in Computing and Commu-
nications/12th IEEE International Conference on Big Data Science and Engineering,.
New York, USA (31 July–3 August 2018). New York, USA: IEEE.
7 Amor, A.B., Abid, M., and Meddeb, A. (2017). A privacy-preserving authentica-
tion scheme in an edge-fog environment. In: 2017 IEEE/ACS 14th International
Conference on Computer Systems and Applications, October 30th – November 3rd
An Efficient Mutual Authentication Protocol in Multi-Access Edge Computing 131
Abstract
Information and operational technologies are being used together and making the indus-
trial Internet of Things (IIoT) happen in the Industry 4.0 paradigm. In this paradigm, smart
devices (i.e. sensors) will be offered services and shared data to the user and so the cloud.
As these devices will communicate with the users through the open network (i.e. Inter-
net), user authentication is one of the most important security features to protect IIoT data
access from unauthorized users. However, there exist traditional security techniques but
these require heavy computational complexities. Therefore, such traditional schemes can-
not be deployed directly to the smart devices in IIoT applications. This chapter proposes a
biometric-based robust access control model (i.e. user authentication) that would perform
a robust authentication and establish a session key between the user and smart devices.
The effectiveness of the proposed scheme is demonstrated in terms of computation cost in
the IIoT environment.
Keywords industrial internet of things; security; access control; biometric
7.1 Introduction
The connection between industry and the advancement in computing, analytics,
low-cost sensing and seamless connectivity of internet is full of promise [1]. The degree
of transformation is emerging and there is reference to a “breakthrough” in terms of
production and operational speed and efficiency. The new innovative constructs are
all around the “data,” which can now be gathered from plants, equipment, electrical
and mechanical machines, thanks to low-cost smart sensors and other smart devices.
These smart devices are equipped with processing and communication capabilities.
Therefore, new and innovative technologies, concepts and platforms are significantly
on the increase in the setting up of the industrial automation: industrial Internet,
Industry 4.0, and IIoT [2]. In [3], the authors reported that the IIoT revolution
will impact economic sectors that currently account for nearly two-thirds of global
gross domestic product, changing the basis of competition and redrawing industry’
boundaries.
In the smart factories or industries (i.e. manufacturing, assembly, etc.), IIoT makes
best use of production and assembly processes producing more fine-grained data by
integrating seamless connectivity and computing to various machines, assembly lines
and tools. More precisely, during the working process, smart factories generate an
enormous amount of data through “smart devices,” i.e. devices with microprocessors
onboard [2]. This data is transmitted to the users, control centers and other machines
via a wireless communication network to maintain smooth and accurate operations in
the factories. As smart devices are resource-constrained devices, the potential deploy-
ment of smart devices (i.e. sensors) for the real-world IIoT applications must deal with
many challenges, including system architecture, availability, quality-of-services, etc.
Among these challenges, security is also one of the big concerns as the smart devices
exchange data with other devices via insecure networks (e.g. Internet) [4]. Exploiting
insecure networks, an attacker can trace and collect the data via eavesdropping and
can redraw the profile of the process (i.e. production status) or other useful informa-
tion of personal interest in a factory use-case. Moreover, in various applications, smart
devices provide services to users directly or a user can directly access the smart devices
via their own hand-held device. However, it is necessary to control who is accessing the
smart device data as shown in Figure 7.1. Therefore, security services, i.e. access con-
trol (and/or authentication) is one of the core requirements for IIoT to protect the data
access from unauthorized parties [4].
addition, the SCFMCLPEKS utilized the traditional public key primitives, such as scalar
multiplication and bilinear pairing, therefore, it needs more energy for the smart devices
attached with IIoT.
Gope et al. proposed a lightweight and physically secure anonymous mutual authen-
tication protocol for real-time data access in an industrial wireless sensor network
(WSN) [6]. The authors discussed three different application scenarios, environmental
sensing, condition monitoring in body-area network, and process monitoring. The
scheme makes use of the physically unclonable function and bitwise XOR operation.
However, Katzenbeisser et al. [7] claimed that the main drawback of Physical Unclon-
able Function (PUF) is limited reproducibility and openness. In addition, raw PUF data
is rarely available for subsequent research, which greatly hinders a fair comparison.
In [8], Das et al. proposed a new biometrics-based privacy-preserving user authenti-
cation scheme (BP2UA) for cloud-based IIoT deployment. BP2UA uses the user’s smart
card and biometric as two factors for authentication purpose. The scheme proposed
in [8] uses bitwise Exclusive-OR and cryptographic hash operations at the smart
devices’s side, whereas the fuzzy extractor method is applied for biometric verification
at the user side. The authors claimed that their proposed scheme is secure against
many attacks, e.g. impersonation, man-in-the-middle, replay, insider, denial-of-service
attacks, etc. The scheme does indeed cover many security properties; however, the
scheme may be vulnerable to masquerade attack. In addition, the overall communi-
cation cost is still expensive as the packet length is high compared to other schemes
mentioned by the authors. In [9], Bilal-Kang designed an authentication protocol in the
future sensor network setting in which IoT can be embedded with WSN. In this scheme,
a sensor node (a legitimate user) can establish multiple concurrent secure data sessions.
They may be vulnerable to a parallel-session attack that can lead to other issues.
As shown above, several secure services and attacks have been addressed in the liter-
ature [5, 9]. However, several papers revealed that the most likely threat to information
security is not the typical hacker, virus, or worm, but rather the malicious insider
user [10]. In existing literature, the security-related all parameters (e.g. passwords,
biometrics, plain identities, etc.) are stored onto corresponding smartcards. Therefore,
security related parameters (especially row information) from the smartcards, are easy
to retrieve via the power analysis tools [8] and that may lead to high risks of security
breaches.
To address the above issues, this chapter proposes a biometric-based robust access
control model for IIoT applications. The proposed scheme utilizes the biometric to per-
form robust authentication – because biometric identifiers are known to unique to indi-
vidual’s and more reliable in verifying identity than those of the sole password-based
methods. The proposed model provides a robust mutual authentication and establishes
a session key between the user and smart devices. To attain a low-computational over-
head, we utilize elliptic curve cryptography (ECC), symmetric cryptosystem, and hash
operation. Security analysis shows that the proposed model can defend popular attacks
and also achieve efficiency.
The rest of the chapter is structured as follows: Section 7.2 discusses the network
model, threat model, security requirements for the proposed model. Section 7.3 pro-
poses our model in detail. Section 7.4 discusses the security analysis, efficiency evalu-
ation and comparison with existing schemes for WSNs. Section 7.5’s conclusions are
drawn for the proposed access control model.
136 IoT Security: Advances in Authentication
Gateway/Base-Station
Sensor
Request
Response
Users with Smart
Phone/PDA or Laptop
N-Users
IIoT Network
data in IIoT applications can be accessed only by the registered users in a secure way, as
shown in Figure 7.2. After user registration, the gateway node issues the security tokens
for every registered user. Then, a user can submit his/her query in an authentic way and
request the sensor data at any time within an administratively configurable period. The
proposed scheme consists of two phases: system setup, and mutual authentication and
key establishment.
Assumptions: Before starting the system, we assume that the gateway is a trustworthy
entity. It is also assumed that the clocks of the user’s mobile device, gateway, and smart
sensor are synchronized in IIoT application [11]. Consider the elliptic curve discrete
logarithm problem (ECDLP), to find an integer r, given an elliptic curve E defined over
F q , a point P ∈ E(F q ) of order n, and a point Q = r P where 0 ≤ r ≤ n − 1, as shown in
[12]. The notations and descriptions are shown in Table 7.1.
Symbol Description
idU , idGW , and idSD Identities of a user (U), Gateway (GW), and smart device (SD)
PWu Password of user U.
HD A hand-held device, e.g. mobile phone
Fq A finite field
E Elliptic curve defined on finite field F q with prime order n
G Group of elliptic curve points on E
P A point on elliptic curve points on E
EK [M] M is encrypted (E) with symmetric Key K
DK [M] M is decrypted (E) with symmetric Key K
K GWSD A shared key between the GW and SD
h() One-way hash function
MAC{M} Message authentication code on message M
||, Concatenation operation
⊕ Ex-or operation
number m and computes the security for each user’s hand-held device (e.g. HD), as
follows: a proxy key pair S = mP and 𝛼 = y + m h(h(S)||idU ). In addition, the GW
generates a unique token (UT U ∈ Zp) and computes g U = h(UT U ||idU ||pwU ||BU )
for each user. The GW stores the proxy key pair (S, 𝛼) along with idU , pwU , BU of all
SDs. Then each SD’s key pair (S, 𝛼), public key (pub2 ), UT U , g U , idGW , h() are stored
securely to each corresponding HD SIM card.
obtains v* ,S* ,idU * , t1* ,t2* . It verifies t2* = t2, if yes then it retrieves the corresponding
authentication token (UT U ) of IdU *, 𝛼 of S* from its table. Now the GW, com-
putes tag* = MAC {UTu*(idU ||BU || 𝛼||idSD *|| t1*)}, and checks (tag* = tag) and
(idSD * = idSD ), if it holds, then the user, HD and SD are authenticated entities. Now,
the GW generates a random integer f , computes SKey = h(v||f||idU ||idSD ||𝛼||t1||t2
||t3), 𝛽2 = E𝛼 [v||f||idSD ||idGW ||t2||t3], and 𝛽3 = EKGWSD [𝛽2||v||SKey ||idU ||idGW || t3].
Here, t3 is current timestamp of the GW and SKey is the session key. Finally, it sends
{𝛽3, idGW , idSD , t3} to the SD.
(v) The SD verifies if (t4-t3) ≥ ΔT then aborts the system. Here t4 is the current
timestamp of the SD. It decrypts 𝛽3 using K GWSD and obtains 𝛽2||v* ||SKey || idU ||
idGW *||t3*. It checks (t3* = t3), (v* = v), and (idGW * = idGW ). If all the conditions
are true, then it sends (𝛽2, idSD , and t4) to user’s HD.
(vi) Upon receiving the message, HD verifies if (t5-t4) ≥ ΔT then aborts the system.
Here t5 is the timestamp of HD. Decrypts 𝛽 2 using 𝛼 and gets v||f||idSD *||idGW * ||
t2 || t3. It checks (idSD * = idSD ), and (idGW * = idGW ), if yes then MD computes a
session key SKey = h(v||f|| idU ||idSD ||𝛼||t1||t2|| t3).
(i) An adversary cannot masquerade GW to cheat SD, since he/she does not have
knowledge of the secret key (KGWSD ). Hence, it is not easy for an adversary to com-
pute the valid response, i.e. 𝛽3 = EKGWSD [𝛽2||v||SKey ||idU ||idGW ||t3] to SD.
(ii) SD cannot masquerade GW to cheat HD. It can be noticed that the SD does not
have any idea about a secret parameter 𝛼, and thus, SD cannot decrypt 𝛽2 = E𝛼 [v||f
||idSD ||idGW ||t2||t3] as this message is encrypted by 𝛼. Here, 𝛼 is shared between
the GW and legitimate SD.
(iii) An adversary cannot masquerade HD as the user uses biometric (BU) to prove own
legitimacy. In addition, if an adversary uses a fake identity (idU ’) and false (𝛼’), then
the corresponding spurious tag = MAC {UT U ,(idU ’||BU ||𝛼’||idSD ||t1)}) can be iden-
tified by HG, because HG cannot be verified ( i.e. tag’ = tag).
Proposed
Ma et al. [4] Das et al. [7] Scheme
the attacker would not be able to decrypt messages 𝛽2 (= E𝛼 [v||f||idSD ||idGW ||t2||t3])
and 𝛽3 (=EKGWSD [𝛽2||v||SKey ||idU ||idGW ||t3]) to compute the session key. Therefore, the
proposed scheme is resistant to the man-in-the-middle (MITM) attack.
Communication Costs
4.5
4
Number of message
3.5
exchanges
3
2.5
2
1.5
1
0.5
0
Ma et al. (6) Das et al. (8) Proposed scheme
scheme and Ma et al.’s [4] scheme. Note that we did not compare the computation cost
of the proposed scheme with the Das et al.’s Scheme [8], as their scheme is based on
the sole hashing and XoRing operations. Overall, the scheme from Das et al. requires an
excessive hashing operation, e.g. 30 T h (approx.).
We evaluate and compare communication costs in terms of the number of message
exchanges for the proposed scheme, and Ma et al. [5] and Das et al.’s [8] schemes. To exe-
cute the whole scheme, Ma et al.’s scheme requires four rounds of message exchanges,
Das et al.’s scheme takes three rounds of message exchanges and the proposed scheme
requires four rounds of message exchanges, as shown in Figure 7.3. However, consid-
ering the security features (refer to Table 7.2), the proposed requires one more round
of message exchanges than Das et al.’s scheme but provides more security features.
Therefore, the proposed scheme can be a practical solution for such real-world IIoT
applications.
7.6 Conclusions
IIoT is an emerging paradigm in the Industry 4.0 where smart devices (i.e. sensors) will
play an important role and offer services and share data to the user. However, provid-
ing security to such time-critical applications is challenging. This chapter proposed a
biometric-based robust access control model (i.e. user authentication) that would per-
form a robust authentication and establish a session key between the user and smart
devices. The effectiveness of the proposed scheme has been demonstrated in terms of
computation and communication costs in the IIoT environment.
142 IoT Security: Advances in Authentication
References
1 Da Xu, L., He, W., and Li, S. (2014). Internet of things in industries: a survey. IEEE
Transactions on Industrial Informatics 10 (4): 2233–2243.
2 Ferrari, P., Flammini, A., Sisinni, E. et al. (2018). Delay estimation of industrial IoT
applications based on messaging protocols. IEEE Transactions on Instrumentation
and Measurement 67 (9): 2188–2199.
3 Luvisotto, M., Tramarin, F., Vangelista, L., and Vitturi, S. (2018). On the use of
LoRaWAN for indoor industrial IoT applications. Wireless Communications and
Mobile Computing 2018: 1–11.
4 Gurtov, A., Liyanage, M., and Korzun, D. (2016). Secure communication and data
processing challenges in the industrial internet. Baltic Journal of Modern Computing
(BJMC) 4 (4): 1058–1073.
5 Ma, M., He, D., Kumar, N. et al. (2018). Certificateless searchable public key encryp-
tion scheme for industrial internet of things. IEEE Transactions on Industrial
Informatics 14 (2): 759–767.
6 Gope, P., Das, A.K., Kumar, N., and Cheng, Y. (2016). Lightweight and physically
secure anonymous mutual authentication protocol for real-time data access in
industrial wireless sensor networks. IEEE Transactions on Industrial Informatics
63 (11): 1.
7 Katzenbeisser, S., Kocabas, U., Rozic, V. et al. (2013). PUFs: Muth, fact or busted?
A security evolution of physically unclonable functions (PUFs) cast in silicon. In:
IEEE International Symposium on Hardware-Oriented Security and Trust (HOST),
Texas, USA (2–3 June 2013). Texas, USA: IEEE.
8 Das, A.K., Wazid, M., Kumar, N. et al. (2018). Biometrics-based privacy-preserving
user authentication scheme for cloud-based industrial internet of things deployment.
IEEE Internet of Things Journal 5 (6): 4900–4491.
9 Bilal, M. and Kang, S.-G. (2017). An authentication protocol for future sensor
networks. Sensors 17 (5): 1–29.
10 Dolev, D. and Yao, A. (1983). On the security of public key protocols. IEEE Transac-
tions on Information Theory 29 (2): 198–208.
11 Neuman, B.C. and Stubblebine, S.G. (1993). A note on the use of timestamps as
nonce. ACM SIGOPS Operating System Review 27 (2): 10–14.
12 Lee, H., Shin, K., and Lee, D.H. (2012). PACPs: practical access control protocols
for wireless sensor networks. IEEE Transactions on Consumer Electronics 58 (2):
491–499.
143
Abstract
One of the major trends in the development of the Internet is the one of ambient Inter-
net of Things (IoT) and even more ambient Internet of Everything (IoE). In this case, the
user seamlessly interacts with various systems and devices, which automatically adapt to
the user’s needs based on the surrounding context. To even further enhance the user expe-
rience, a gadget-free or also called Naked-approach scenario is considered, where the user
is able to experience the services without carrying any gadget. We present in this chapter a
use case from the medical and healthcare sector using such a Naked approach, enabling an
ambient IoE experience for the patient. Through direct interaction with the environment,
using biometrics-based authentication and symmetric key-based operations, the patient is
identified and is able to perform confidential and authenticated communication. A con-
crete and total security solution is presented, together with a discussion on the strength
against well-known attacks. The performance analysis of the scheme shows the feasibility
of the proposed approach.
they are actually narrowing our senses. They are squeezing our attention and tunnelling
our vision through a miniature high-definition display and forcing us to stiffen our joints
to repeat micromotoric movements needed to interact with the device. We are sliding
into a world of joint digital escapism. Figure 8.1 gives an overview of the evolution of
Internet since 2000 [13, 16]. There must be an alternative.
Our guideline for the new-user experience and design is the Naked user approach. In
this digital paradise any user - like me - can live Naked without carrying (or bumping
into) gadgets. My services and interfaces will appear from the texture of the environ-
ment when I need them and disappear when not needed [1, 2]. If I want, I will be
constantly but discretely connected to my communities - family, friends, work - and
have instant access to my digital information sources and services. My surroundings -
and the services behind them - will support my lifestyle, boosting my daily routines.
The environment seems to know me better than I do. But I feel safe, because the use
of the information is fully transparent to me. I own and have complete control over my
data. And my data can be accessed only with my permission by trusted actors via trusted
channels. Digital privacy and domestic peace legislation ensures I have the ability and
right to disconnect - be unavailable, untraceable when I need privacy [12, 14]. Figure 8.2
illustrates this vision of a gadget-free world.
The physical devices connected to the higher order systemic functions (networks, data
processing, services) will form a technology basis for the Surroundings as a Service.
As an embodiment of the digital services, the surroundings will provide information,
connections, tools, and guidance for the user as well as adjustments for living conditions
(automation). The surroundings will collect data that is processed and bred to various
kinds of digital information that can then be used by other services. This constantly
growing personal or joint information property is one of the key components of future
societies and businesses. Instead of growing wood or vegetables, we will be growing,
breeding, processing, and using information [1].
The fundamental benefits for the user are:
• enabling the use of digital services through our surroundings, with a human sized,
intuitive interface (like picking a fruit in paradise) without the need to carry or use
any personal gadgets.
Gadget Free Authentication 145
The user lives The services appear when ... and disappears
without gadgets the user needs it... when not needed
• providing the ambient connectivity and information in the texture of our surround-
ings without the need for our full concentration on our interfaces of our carriable
gadgets. We will functionalize and enhance our surroundings instead of pulling our
focus away from it.
• enabling the growth of users’ personal digital information property by collecting and
processing the data related to their environment, daily routines, communities, and
enabling smart digital services based on this pool of information - leading to efficiency
of daily tasks and advanced service and usage models in communications and lifestyle.
• enabling local harvesting of energy as an integral part of the system.
Benefits for society:
• enabling sustainable growth towards hyper-connected society via the paradigm
change in the embodiment of digital services.
• enabling energy optimization on several levels - energy harvesting as a major func-
tionality of the devices, reduced role of wireless cellular networks as the last-mile
connectivity solution, decreased need for global telecommunications as a part of
surroundings-as-a-service concept; tools for smarter automation and control.
• new knowledge and services through hyper-connected citizens, objects and spaces:
better understanding of the daily connections, rhythms, routines and conditions of
the society; stronger networking between citizens, helping in constant care, delivery
of services, and new ways of working.
The Naked-user approach will compete with the current gadget-centric development
trends such as mobile terminals and pads, the wearable gadgets (smart watches, wellness
monitors, “google” glasses), the converging of building management systems (including
HVAC, smart lighting, people-flow technologies), and the smart appliances and enter-
tainment electronics. However, compared to these, our approach has its own niche,
complementing or replacing these technologies. The Naked Approach provides an
alternative where people live inside the digital reality instead of using it through gadgets.
The vision is challenging with respect to many of its major disciplines. Certain
features for the user interface, such as identification, privacy control, and context
146 IoT Security: Advances in Authentication
recognition may require solutions like the carrying of ID chips or requests about
activities from the user (biometric identification, keywords). The migration and
adaptation of services to different surroundings may be limited at first. The realization
of communications, energy solutions, and swarm-intelligent functionalities of the
physical interaction layer may require extensive work. To overcome the risks and dodge
the potential show-stoppers, we have built a team of highly co-operative top experts
representing different disciplines as well as visionary cross-technological leadership.
The transition from gadget to the Naked World can easily be defined by three key
phases i.e. bearable, wearable and nearable.
• Bearables are kind of hand-held gadgets which are the most common way of acquir-
ing digital services nowadays. The most commonly used bearables are smartphones,
laptops, tablets and PDAs. The current trend of bearables are getting declined due to
wearable technology.
• Wearables are digital devices, which are worn by users to obtain digital services. It is
the combination of smart sensors along with fashionable wearing items resulting in
stylish wearable devices. Some of the most-used wearables are smart watches, smart
clothes and google glasses among others. Wearables have a huge application in health-
care because nowadays they are used frequently to monitor the fitness and health
parameters of users like heart rate, temperature and blood pressure.
• Nearables are the final phase towards the Naked World where the user would have
direct and seamless interaction with smart surroundings. The digital services appear
to the user from the texture of the environment when needed.
During the transition from gadget to the Naked World, there are a number of factors
that must evolve. For instance, the interaction of the user will be quite different from the
current gadget-based interaction. Multi-modal interfaces will be required for the user’s
seamless interaction with the environment. Data sharing is another major thing which
would also change as we move from gadget-centric to the user-centric world. Data is col-
lected and shared by the environment, devices and systems present in the environment.
Data is moved from local storages to storages in the infrastructure, such as servers or
clouds. The identification of the user would also be different from the current username-
and password-based solutions. The biometrics-based identification mechanisms seem
to be an ideal candidate for the Naked environment, but require special attention with
respect to theft and tamper resistance.
Distinctiveness
Circumvention
Collectability
Acceptability
Performance
Permanence
Universality
Characteristic
Face H L M H L H H
Fingerprint M H H M H M M
Hand geometry M M M H M M M
Iris H H H M H L L
Keystrokes L L L M L H H
Voice M L L M L H H
accessible locations. Moreover, passwords can be lost or forgotten by the user and are
easy to share with different users.
Therefore, in order to enforce more or less seamless and ambient authentication, the
use of biometrics seem to be a potential candidate for the identification and authenti-
cation of the users in such Naked environment. The most popular types of biometric
characteristics are face, fingerprint, hand geometry, iris, keystrokes and voice. Table 8.1
[17] gives a short overview of these biometric characteristics with respect to the follow-
ing features:
• Universality addresses the fact that all people possess the biometric.
• Distinctiveness corresponds to the possibility of being able to distinguish based on
the characteristic.
• Permanence defines how permanent the identifier is with respect to time or other
environmental conditions.
• Collectability gives an answer on how well the characteristic can be captured and
quantified.
• Performance addresses both issues related to speed and accuracy.
• Acceptability corresponds to the willingness of people to use and share the charac-
teristic.
• Circumvention addresses the possibilities of being capable of going wrong or being
misused (foolproof ).
The level of satisfaction of the biometric characteristic for each of these features is
based on the author’s perception [17] and is equal to High, Medium, and Low, which is
represented in the table by H, M, and L, respectively.
As can be concluded, each biometric characteristic has advantages and disadvantages.
There is no single optimal solution. The choice depends on the application. Moreover,
in our case, the choice mainly depends on the accuracy of the characteristic. This is
explicitly discussed in Section 7 of this chapter.
Note that there is currently also research to investigate the use of other biometric
characteristics such as retina, infrared images of face and body parts, gait, odor, ear,
and DNA. However, insufficient evidence of accuracy is currently available for these
characteristics.
148 IoT Security: Advances in Authentication
Registration
Center (RC) Medical Server
2. Installation
1. Register of ENs
with RC 3. Generates
Key Material
8.4.2 Setting
We distinguish four different entities in the system, being the User (U), the Registration
Center (RC), the Access Point (AP), and the Sensors or End Nodes (ENs) offering the
services. Table 8.2 contains all the notations used for the proposed scheme.
The user first registers with the RC when requesting the services of the ENs corre-
sponding to a particular AP. Then, the RC generates the appropriate key material for
the AP. After this initialization, the user can now be authenticated by the AP, which will
further process the request to the associated ENs. The AP is able to capture the bio-
metric information of the user. Note that in case of a large number of users, the AP will
serve as a gateway and an additional server will take over its role for user authentication
and the construction of the secured response including the user’s request to the ENs.
For the sake of simplicity, we do not consider our explanation in this situation and limit
ourselves to these four entities.
150 IoT Security: Advances in Authentication
Notation Description
RC Registration Center
AP Access Point
ENj End Node j
Ui User i
x, y Secret values by RC
b Random number
IDi Identity of user i
i
Pref Reference biometrics of user i
Ek (.)∕Dk (.) Symmetric encryption/decryption with key k
|| Concatenation operator
⊕ XOR operator
Rj , sj Output and state of PRNG in step j
We assume that the communication between RC and user, RC and AP is secured using
well-established mechanisms. The RC is considered a robust and secure entity, whereas
the AP and ENs in the field might be more vulnerable to tampering. The explanation
will focus on the interaction between user and AP on the one hand and AP and ENs on
the other hand.
An outsider should not be able to derive the identity of the user in the whole process,
nor to derive the content of the transmitted data. In addition, even if one of the devices,
APs or ENs are tampered, an attacker might not be able to steal the biometric charac-
teristics of the user or to perform other damaging actions. Only authenticated users are
able to request services or access to the ENs.
The attackers may come from inside or outside the network. They are able to eavesdrop
on the traffic, inject new messages, replay and change messages, or spoof other identi-
ties. Their goals might be to obtain illegitimate data access to the nodes, to perform
service degradation or denial of service.
8.4.3 Notations
We represent a hash function by H. The encryption operation of message m under a key
K to obtain the ciphertext c is denoted as c = EK (m), and the corresponding decryption
operation as m = DK (c). Furthermore, the concatenation of values m1 and m2 is denoted
by m1 ||m2 and the xor operation by m1 ⊕ m2 .
We denote by S the finite set of states of the PRNG. The initial state s0 ∈ S is obtained
after mapping with seed z. The next state function is denoted by 𝛿 and the output func-
tion by 𝜌 producing the value Rj after step j.
the actual request phase (5) and the corresponding response phase (6). We now discuss
each of them in more detail. For ease in notations, we restrict the explication to only one
AP and one end node with identity ENj .
whether there is a potential candidate, meaning that the distance is lower than the pre-
defined threshold of 0.32 [5]. If successful, the process can continue and an activation of
ENj can be initiated by sending a request message to it. The biometric recognition system
proposed in [6, 7] highlights the importance of distance while acquiring and matching
for biometric traits.
152 IoT Security: Advances in Authentication
Finally, the message C3 ||V2 ||ESKij (M), with M the requested info (GET request) or a con-
firmation (POST, DELETE, PUT request) are sent to the AP.
The AP first derives Nj = C3 ⊕ H(H(Pref i
)||Ni ). Next Ni ⊕ H(ENj ||Bi ||Nj ) is calculated
and compared with the transmitted value V2 . If positive, mutual authentication is
Gadget Free Authentication 153
obtained and the shared symmetric key can be derived in order to decrypt the last part
of the message.
8.6.1 Accountability
Note that a logging mechanism should be installed in each node. Each log contains the
parameters Bi ||Ni . The parameter Bi gives no direct information to a certain identity.
However, by keeping track of the same pseudonym, abnormal behavior leading to, for
instance, service degradation and denial of service attacks, can be more easily detected.
In case of doubt, the AP or RC will be contacted to derive the identity.
8.6.3.1 Compromised AP
Let us assume that the attacker has physical access to the database of the AP, which
stores the secret key material of all its users, being a list of valid combinations of
Bi , Ci , Di , Ei , H(Bi ||Ci ||Di ||Ei ). Even in this situation, it is still impossible to formulate a
154 IoT Security: Advances in Authentication
i
valid request as the biometric information Pref of a user U is required to retrieve the
parameter H(x) and the corresponding parameter H(Ai ). Note that we still assume that
the AP has the capabilities to securely run its operations and to store the output and
the next state of PRNG.
Also, a compromised AP is unable to derive information given by messages sent by
the other APs as it is not aware of H(x) and thus H(ENj ||H(x)).
He [8] 5TH + 2TS + TM 12TH + 4TS + 7TM 17TH + 6TS + 8TM 13.417ms
Baruah [4] 6TH 7TH 13TH 0.0299ms
Odelu [15] 4TH + 2TS + TM 13TH + 4TS + 5TM 17TH + 6TS + 6TM 17.847ms
Our Scheme 6TH 5TH TH 0.0253ms
156 IoT Security: Advances in Authentication
(160+160+128) = 448 bits. Hence as a result, total communication overhead using our
proposed scheme is 608+448 = 1052 bits. We can see that our scheme has significantly
better communication costs in comparison with [8] and [15] which takes 2994 bits and
3520 bits respectively. However, our scheme possesses a slightly higher communication
cost compared with the scheme of [4].
8.8 Conclusions
In this chapter we propose a complete security solution for a gadget-free patient to
establish a secure and authenticated channel with medical sensors embedded in a hospi-
tal. Based on accuracy metrics of the iris biometrics, feasibility of the approach is proven.
The scheme is shown to be resistant against replay attacks, insider attacks and even hard-
ware/software attacks against the medical sensors in the hospital. Moreover, the identity
of the patients is protected and accountability of the devices is obtained through logging.
Thanks to the usage of solely symmetric key-based operations, the proposed scheme is
very efficient, both with respect to computational and communication cost.
Acknowledgement
This work is supported by European Union RESPONSE 5G (Grant No: 789658) and
Academy of Finland 6Genesis Flagship (grant no. 318927) projects.
References
1 Ahmad, I., Kumar, T., Liyanage, M. et al. (2018). Towards gadget-free internet ser-
vices: A roadmap of the naked world. Telematics and Informatics 35 (1): 82–92.
2 Aikio, J., Pentikinen, V., Häikiö, J., et al. (2016). On the road to digital paradise: The
Naked Approach. Lapland: University of Lapland.
3 Amara, M. and Siad, A. (2011). Elliptic curve cryptography and its applications.
Systems, Signal Processing and their Applications (WOSSPA), 2011 7th International
Workshop, Tipaza, Algeria (9–11 May 2011). IEEE.
4 Baruah, K.C., Banerjee, S., Dutta, M.P. and Bhunia, C.T. (2015). An improved
biometric-based multi-server authentication scheme using smart card. International
Journal of Security and Its Applications 9 (1): 397–408.
Gadget Free Authentication 157
5 Daugman, J. (2009). How iris recognition works. In: The essential guide to image pro-
cessing (ed. Alan Bovik), 715–739. New York: Elsevier.
6 Dong, W., Sun, Z. and Tan, T. (2009). A design of iris recognition system at a dis-
tance. Chinese Conference on Pattern Recognition, 2009. CCPR 2009, Nanjing, China
(4–6 November 2009). IEEE.
7 Fancourt, C., Bogoni, L., Hanna, K. et al. (2005). Iris recognition at a distance. Inter-
national Conference on Audio-and Video-Based Biometric Person Authentication,
Hilton Rye Town, USA (20–22 July 2005). Springer.
8 He, D. and Wang, D. (2015). Robust biometrics-based authentication scheme for
multiserver environment. IEEE Systems Journal 9 (3): 816–823.
9 Kilinc, H.H. and Yanik, T. (2014). A survey of sip authentication and key agreement
schemes. IEEE Communications Surveys & Tutorials 16 (2): 1005–1023.
10 Kumar, T., Braeken, A., Liyanage, M. and Ylianttila, M. (2017). Identity privacy pre-
serving biometric based authentication scheme for naked healthcare environment.
2017 IEEE International Conference on Communications (ICC), Paris, France (21–25
May 2017). IEEE.
11 Kumar, T., Liyanage, M., Ahmad, I. et al. (2018). User privacy, identity and trust in
5g. In: A Comprehensive Guide to 5G Security (eds. M. Liyanage, I. Ahmad and A.B.
Abro), 267. New York: John Wiley & Sons.
12 Kumar, T., Liyanage, M., Braeken, A. et al. (2017). From gadget to gadget-free hyper-
connected world: Conceptual analysis of user privacy challenges. 2017 European
Conference on Networks and Communications (EuCNC), Oulu, Finland (12–15 June
2017). IEEE.
13 Liyanage, M., Ahmad, I., Abro, A.B. et al. (2018). A Comprehensive Guide to 5G
Security. New York: John Wiley & Sons.
14 Liyanage, M., Salo, J., Braeken, A. et al. (2018). 5g privacy: Scenarios and solutions.
2018 IEEE 5G World Forum (5GWF), Santa Clara, USA (9–11 July 2018). IEEE.
15 Odelu, V., Das, A.K. and Goswami, A. (2015). A secure biometrics-based
multi-server authentication protocol using smart cards. IEEE Transactions on Infor-
mation Forensics and Security 10 (9): 1953–1966.
16 Porambage, P., Okwuibe, J., Liyanage, M. et al. (2018). Survey on multi-access edge
computing for internet of things realization. IEEE Communications Surveys & Tuto-
rials 20 (4): 2961–2991.
17 Uludag, U., Pankanti, S., Prabhakar, S. and Jain, A.K. (2004). Biometric cryptosys-
tems: issues and challenges. Proceedings of the IEEE 92 (6): 948–9604.
159
Abstract
Over the last decades the Internet of Things raised in its importance and became more and
more part of everyone’s life (e.g., smarthome, fitness tracking). In parallel different requests
for privacy support, mobility support and flexible privilege handling raised. Thus, this
book chapter summarizes the current situation and concerns of users and network owners
in the IoT. Based on investigated and identified concerns and users’ request, it categorizes
and discusses the requirement design of WebMaDa (Web-based Management and Data
Handling Framework) addressing the identified issues. WebMaDa supports the mobility
request of users and at the same time place the total network and data control with the
network owner, reducing the administrator or third-party involvement to a minimum.
Thus, special focus in WebMaDa’s design was in (i) automated request handling and (ii)
addressing of data control with respect to privacy and transparency. The realized system
is evaluated by a proof of operation.
9.1 Introduction
Today, different devices are connected forming small networks and being an integral
part of the Internet of Things (IoT). Such networks are typically designed to provide indi-
vidual solutions for a certain purpose (e.g., environmental monitoring or health moni-
toring) [1–3]. Devices used potentially show a large heterogeneity concerning hardware
and software, thus, a linking to specialized systems allows for analysis and visualization
of the data collected. While such an approach exists for IoT, it does not exist for an inte-
grated handling of user requests and network owners changing over time in support of
(i) mobility, (ii) ownership and controlling of data, and (iii) updating privileges granted
immediately. Thus, the Web-based framework leads to the innovative and practical solu-
tion discussed here.
Many specific solutions exist to address mobility requests, while installing a dedi-
cated application on the mobile device. This is considered to be a good solution, but
Corinna Schmitt: This work was performed during her employment at University of Zurich.
these solutions typically pose special requirements to the device’s operating system
and can quickly exhaust the device’s resources, while being in operation. Integrating
energy-saving mechanisms can solve the latter problem, but applications may still
require memory. Thus, Web-based solutions are considered highly appropriate, as they
only require Internet access and a browser on the controlling devices. Furthermore, the
code base in use must only be updated in a single instance, which reduces maintenance
costs.
The demand on handling ownership aspects and control of data increases due to wider
offers of third-party services in support of analysis and visualization of data. Addition-
ally, a possible misuse of unauthorized data access in IoT needs to be avoided. Thus, in
combination with user demands, to be able to update privileges and to grant access to
the data collected, challenges arise due to the situation that accesses granted to users
can hardly be revoked or updated immediately, if at all.
WebMaDa, a Web-based Management and Data Handling Framework, addresses the
three aforementioned aspects (i)–(iii) for sensor networks in an integrated manner. The
development started in 2014 with basic support of mobile access to sensor networks
owned by a single user, while allowing for the visualization of data in a flexible and
hardware-independent manner [4]. WebMaDa was extended by addressing the general
request of fine-grained access management and pulling data in emergency cases [5].
The drawback was that each request (e.g., create networks, access foreign networks,
view, or pull data) required an interaction with a global administrator, thus, maintaining
a central control and introducing unnecessary delay into the system. WebMaDa 2.0
solved this deficiency by automating the request and allowing for an immediate access
grant handling without the involvement of a global administrator [6]. Additionally,
WebMaDa 2.1 also addresses the demand for privacy and controlling data access
besides the pure automated processing of requests by forwarding to the respective
contact points using a mailing system. This ensures that network owners hold the full
control of data collected and receive full transparency of when and by whom data was
accessed and which rights had been granted.
This chapter summarizes the current situation and concerns of users and network
owners in IoT. In turn, it categorizes and discusses the requirements design of Web-
MaDa. Consequently, WebMaDa is presented in detail with the special focus on (i) the
automated request handling and (ii) the addressing of data control with respect to pri-
vacy and transparency. The evaluation provides a proof of operation.
Furthermore, users became aware of the fact that collected data can support profiling
and predict habits. Both usually occur in the data flow as soon as third-parties are
involved (e.g., displaying data or storing data in the Cloud) leading to a loss of data
control. This is contradictable to the expectations and definition of ownership, which
was strengthened by the release of the General Data Protection Regulation (GDPR)
[7] in May 2018 in Europe. Thus, the second request of IoT-device users focuses on
ownership support.
The third concern about immediate privilege update support follows the first two con-
cerns directly. As users are more and more mobile, they have no direct contact to the
deployed devices and also want to access them remotely, perhaps even giving specific
people access to them and update granted privileges. In theory, this can happen eas-
ily, but here again a control-loss happens, because the owners must trust a third-party
offering such an access management service and require an involvement of unknown
persons (e.g., administrator) to react on requests in time. Where the timing issue might
be critical, in some cases, like emergency cases or losing trust in people having access.
Further, owners want to be kept informed about privilege changes and access to data
that depend on the third-party if it is done in time or even at all.
All these concerns can partially be addressed by third-party services, but at the same
time require full trustability that the service follows rules like those mentioned in the
GDPR, for example, strengthen data subject rights, data protection officer in place,
privacy-by-design and by-default, and data breach notification [7]. Thus, WebMaDa
was developed to address the aforementioned three concerns step-wise until processes
were automated sufficiently to reduce the involvement of administrators and giving data
owners full control of their collected and published data. The upcoming section presents
the design decisions taken leading to the establishment of the WebMaDa framework.
https://webmada.csg.uzh.ch
WebMaDa-DB
Sink wss://pull.webmada.csg.uzh.ch
WebMaDa’s
CoMaDa Tomcat backend
own and requesting immediate data [5, 10]. However, the administrator is still involved
in different stages:
• Privilege requests must be handled, as no direct contact possibility between owner
and user exists.
• Network or data deletion is requested by owners as there exists no right to cause it
directly.
• Controlling requests must be addressed manually, i.e. when an owner wants to know
how to access the data and when.
Thus, WebMaDa 2.1 was developed addressing the concerns mentioned in Section 9.3
and reducing the involvement of the administrator as much as possible to improve
reaction times of requests and to address the owner’s requests on control and immediate
privilege updating. The resulting solution includes an automated user request handling
solution, mailing and notification solution, and an extension of the WebMaDa-DB for
controlling purposes.
compared to PHP’s built-in feature; it was decided to use it here. Another advantage
of PHPMailer was that most of WebMaDa was already implemented in PHP and, thus,
the integration of the library can be considered a logical step on the one hand, while
on the other, it also pays attention to security standards like Secure Sockets Layer
(SSL)/Transport Layer Security (TLS) that were already included in WebMaDa 2.0 and
should further be supported.
Receiving access
request via Email Log into Accept Invitation code
Grant
notification admin interface request? creation
WebMaD’s
administrator
Automated Email notification
Deny
Manual processing
Waiting
Deny
with a unique identifier – the WsnId – each placed request from now on is linked to this
unique identifier. In return, a list of available nodes in the selected WSN is presented in
the frontend, where the user now selects the permissions he/she wants to request. As
soon as the request is placed, an Email is automatically created including the informa-
tion about the request and is directed to the network owner. The owner’s Email contact
is received from the WebMaDa-DB by placing an automated processed query to look up
the contact information via the unique WsnId of the selected WSN. The network owner
receives a notification in his/her Email account that a permission request was placed to
the owned WSN. After logging into WebMaDa, the owner can deny or grant the request.
In the first case, an Email is automatically sent out to the requestor with the information
that the permission request was denied. In the other case, the network owner can either
directly approve the placed request or modify the permissions requested (e.g., adding
further rights or limit request rights). Next, an Email is automatically generated and sent
back to the user, who placed the request. In both cases, entries in the WebMaDa-DB are
made including information of changed permissions to the respective WSN and about
the sent Emails. In return, the user receives a summary of the request processing, can
agree on it, when the request satisfies his/her initial request continuing with accessing
the data or start the process from the beginning again to ask for modified permission.
As it can be seen by the flow shown in Figure 9.4 and with the above description
interaction by WebMaDa’s administrator is no longer required for handling any access
requests for foreign networks. Thus, the time required for receiving access is only trig-
gered by the reaction times of the network owner his/herself. He/she is also able to
update given rights on his/her own without involving the administrator at all and is
able to inform the permission holder automatically by Email when granted rights are
modified or revoked at any time.
and can, therefore, be used as a secure combination that is known only to the user
itself.
5. The updated information is stored in WebMaDa-DB and the user can log into Web-
MaDa with his/her new credentials.
• Rights_Log stores all changes that affect the effective permissions of a user to a certain
WSN which are logged in this table. This includes newly granted permissions but also
access revocation and changes to existing rights. Additionally, it is mentioned if it
impacts push or pull permissions.
• PermissionRequests_Log stores all permission requests to a certain WSN which are
stored in this table. This includes the creation of the request, as well as an accept,
deletion, or alteration by the administrator.
For the sake of completeness, it must be mentioned here that this detailed logging
solution might affect the privacy of users and/or owners at the same time. The purpose
of such a logging system is to provide a history of the changes that were made to the
system – here WebMaDa and network access. This issue becomes highly relevant as
soon as a WSN is reset (data deleted but WsnId still exists) or deleted (data and WsnId
deleted) by the network owner. Based on the understanding of transparency mentioned
above, it was decided that even if a WSN is deleted, the logs of this network are kept
in the WebMaDa-DB. This should not have any impact on privacy related topics as
there is only meta data stored in the WebMaDa-DB. For instance, no actual data like
temperature or humidity is logged, but only data on administration activities on the
network (e.g., access requests, changed rights, and network privacy settings). In order
to obtain logging information for such deleted or reset networks the administrator
must be contacted and the requestor must prove the ownership. [6]
Further, only network owners have access to see the logs of changed rights and
permission requests of their owned networks. Additionally, they can see logged data of
their active WSN, for example, when it was created, reset, deleted, or when the privacy
settings were changed. On the other hand, administrators can see different Emails that
were sent, high-level meta data of the active WSNs (e.g., reset, deletion, creation, and
privacy), invitation requests and codes, as well as changes to the root account and the
different users. [6]
Within WebMaDa 2.0, a filtering option was included allowing the network owners to
stay in control of their owned networks [10]. This filtering system uses the exhausting
logging system to present the network owner with requested information. In order to
ensure that only network owners can perform filtering, this option is only activated as
soon as the credential check for ownership is successful. This is done directly as soon as
a user logs into WebMaDa and clicks on the button “Filtering” in the frontend of Web-
MaDa. If the validation fails, the user is informed about not owning the networks. Other-
wise, he/she can proceed and adjust the filter to his/her requests and filter each attribute
of the stored tables. The following attributes can be used to specify the filter [10]:
• Username,
• Type (push or pull or push&pull),
• SensorName (e.g. Voltage, NodeTime, Temperature, Humidity),
• Action (grant or remove), and
• Time.
Depending on the configuration of the filter and the size of the dataset handling, the
query can take time. Thus, an efficient and scalable frontend solution must be in place
to simplify usability. Therefore, it was decided to use DataTable2 plug-in as it is explicitly
designed for bootstrap styling and prevails negative aspects.
9.6 Implementation
This section presents implementation details for the notification process, the logging,
and the filtering in WebMaDa 2.1. All relevant scripts and files are fully integrated into
the previous version of WebMaDa, both in the front- and backend. With these enhance-
ments and modifications, WebMaDa 2.1 can now fulfill the wishes and requests of cur-
rent users mentioned in Section 9.2. A corresponding proof of functionality is given in
Section 9.7.
Network owner
wants to delete a
permission request
data:{
Wsnld,
Wsnld Username Token CsrfToken,
Username
}
my-wsns.js
deletePermissionRequest.php
$(’.deletePermissionRequest’)
.on(”click”, function(e))
Return 1: successful
Ajax Request
Return 0: error
error / success
sendEMail(purpose, emailData)
mailFactory.php
Ajax Request
routeRequest
error / success
sendDeletePermissionRequestMail()
Figure 9.5 Dataflow between scripts for mailing solution in WebMaDa 2.1.
called located in the util.js, because it is a method that will be utilized by different scripts.
In order to create the necessary mail for notification, the required data (here: recipi-
ent Email and information for the mail body) is gathered. Next, a new Ajax request is
sent to the mail factory including the gathered data. In the mail factory, the request is
then routed based on the provided purpose (here: DeletePermissionRequest). Finally,
the method sendDeletePermissionRequestMail(additionalData) is called, which fills the
provided data into the mail template and then sends it via the function sendMail(). At the
end of the process, the method mailSent() is called creating a log entry for the recently
sent mail in the corresponding table in WebMaDa-DB.
A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel 175
Similar to the mailing process was the process of adding a new log entry implemented.
If an action is triggered via JQuery, the operation is executed and based on the return
value an Ajax POST request is sent to the script logFactory.php. Here as parameters con-
sidered are the purpose of the request and the additional data containing the elements
that need to be logged (e.g., username, WsnId, and the sensor that access is requested
for). Next the routeLogRequest method is called where a switch statement is used to
decide where the request should be routed. The route is determined by the provided pur-
pose in the Ajax POST request. Due to the broad variety of different tables and actions
that must be considered, an individual method must be created for each type of event
that should be logged. Finally, the data is written into WebMaDa-DB using PHP Data
Objects (PDO) calling a storing procedure consisting of an insert statement.
176 IoT Security: Advances in Authentication
Listing 9.1 Stored procedure getting the logged entries of the selected network.
addressed by WebMaDa 2.1, namely (i) mobility support, (ii) ownership control, and
(iii) immediate privilege handling.
means that the request was granted, but the registration process not yet concluded.
Independent of accepting or denying the placed request the requestor receives an Email
about the status update. Here Figure 9.8, mail no. 3 shows the mail sent out when the
request was granted. Automatically, the admin’s view is updated and the granted request
is shifted to the section pending invites waiting for the requestor concluding the regis-
tration (cf. Figure 9.9b).
As this process shows, the interaction with the administrator is very limited and every-
one receives notification about status and actions. Furthermore, there is no longer any
need to publish an Email address, which prevents the administrators Email address from
ending up in a spam mailing list. Additionally, with slight adaptations in the backend
WebMaDa’s administrator can now give authenticated users the right to act as an admin-
istrator in parallel. This means work can now be distributed to several people and, thus,
it is guaranteed that the creation of users can remain operative even in case of illness or
other absence of a key person. Since the process has been simplified and unnecessary
intermediate steps (e.g., opening and writing an Email) have been omitted, the goal can
be considered of intermediate and automated request handling is fulfilled.
Figure 9.9 Administrators view showing placed requests and pending invites.
Figure 9.10 View of current access permissions to foreign networks and selection opportunities.
in the database. When now querying a new permission request the user selects the
foreign network in a dropdown menu (here: Buenzli2, cf. Figure 9.10). Immediately
after selecting the network of interest, a window pops up where the user can place the
detailed request (cf. Figure 9.11; here: requesting push for Humidity-TelosB and pull for
Temperature-TelosB), where A0LDUV5L6O equals the WsnId for the selected foreign
network “Buenzli2” in WebMaDa-DB. As soon as the user pushes the button “Open
Request” the automated notification system becomes activated, creating corresponding
Email to the involved people that raised the request. Additionally, all information is
written in the WebMaDa-DB. Visual feedback is given to the user in the GUI by listing
pending permission requests (cf. Figure 9.12a).
When the network owner receives the notification per Email he/she logs into
WebMaDa and can see in the submenu “My WSNs” pending requests as shown in
Figure 9.12b. Now he/she can either directly grant it without changes, deny it or update
it. In the last option the network owner can modify the placed request before granting
it. This means he/she can remove requested permissions, grant additional ones or grant
A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel 181
others. When the settings satisfy the network owner he/she pushes the button “grant”
and in the backend notifications are created to inform the requestor and network
owner about changes, as well as entries are created in WebMaDa-DB. Automatically
the requestors view is updated by moving the request from section “My permission
requests” into the section “Privileges” in the GUI and in parallel a notification is send
per Email to the requestor to inform about the status change.
With this solution design the network owner stays in full control of gathered data and
can grant, update and/or revoke privileges whenever necessary without involving the
administrator anymore, because the process automatically matches the selected WSN
to the linked unique WsnId in the database and checks the corresponding owner and its
mail. This information is then used to construct the initial notification. The answering
process works in a similar way. The delay in handling the request is only influences by
the network owner, who needs to handle the request.
182 IoT Security: Advances in Authentication
The option for the network owners to mark the network as “private” serves as an
important means of data security. This option is enabled by default and prevents other
users from seeing the network or making access requests. However, this setting does
not affect any existing access rights, instead it just controls the visibility of the network
under “Other WSNs” in WebMaDa’s submenu.
The first concern on mobility support was the driving force to develop WebMaDa
itself, by offering a Web-based framework with functionalities such as registering
network, grant/revoke/update privileges, and viewing gathered data. WebMaDa 2.1
extends now these basic functionalities by offering network owners filtering function-
ality, allowing seeing data access and granted rights also when being physically absence
from the deployed network and the instance CoMaDa. This functionality also addresses
the second concern on ownership support, as in WebMaDa 2.1 network owners can
query requests to WebMaDa-DB directly accessing the exhausting logging system.
The third concern about immediate privilege handling is now possible by WebMaDa
2.1 as no third-party like the administrator is involved anymore when access requests
are placed. This became possible with WebMaDa 2.1 by including the automated
notification system by informing involved parties directly about placed requests, status
about the request, and updated that were processed. Everything is automatically in the
backend logged to address the ownership support additionally.
Overall it can be stated that with the new included functionalities – automated request
handling and addressing data control in parallel – WebMaDa 2.1 now addresses cur-
rent concerns in IoT and strengthens the ownership with minimal involvement of third
parties. For the future it is envisioned to offer more visualization opportunities via Web-
MaDa 2.X, like dynamic graph creation, and optimizing the logging solution to improve
scalability of tables by including compression for archiving purposes. Further WebMaDa
should be linked to other types of networks to collected data and on the other side link
WebMaDa to actor systems such as climate control systems in order to trigger events
when being abort (e.g., closing/opening window, turning off/on heating).
References
1 Porambage, P., Ylianttila, M., Schmitt, C. et al. (2016). The quest for privacy in the
Internet of Things. IEEE Computer Society 3: 34–43, April.
2 Schmitt, C. and Carle, G. (2010). Applications for Wireless Sensor Networks
(Chapter 46); Handbook of Research on P2P and Grid Systems for Service-Oriented
Computing: Models, Methodologies and Applications, Edited by. N. Antonopulus, G.
Exarchakos, M. Li and A. Liotto, pp. 1076–1091, ISBN: 1-61520-686-8, Information
Science Publishing, January.
3 Atzori, L., Iera, A., and Morabito, G. (2018). The Internet of Things: A survey;
Journal Computer Networks 54 (15): 2787–2805, October.
4 Keller, M. (2014). Design and Implementation of a Mobile App to Access and Man-
age Wireless Sensor Networks; Master Thesis, Communication Systems Group,
Department of Informatics, University of Zurich, Zurich, Switzerland, November.
5 Schmitt, C., Anliker, C., and Stiller, B. (2016). Pull Support for IoT Applications
Using Mobile Access Framework WebMaDa; IEEE 3rd World Forum on Internet of
Things (WF-IoT). New York, NY, USA December, pp. 377–382.
6 Bünzli, D. (2018). Efficient and User-friendly Handling of Access Requests in Web-
MaDa; Bachelor Thesis, Communication Systems Group, Department of Informatics,
University of Zurich, Zurich, Switzerland, January.
7 European Parliament (2016). Regulation (EU) 2016/679 of the European Parliament
and of the Council of 27 April 2016 on the protection of natural persons with regard
184 IoT Security: Advances in Authentication
to the processing of personal data and on the free movement of such data, and
repealing Directive 95/46/EC (General Data Protection Regulation); Document ID
32016R0679, Brussels, Belgium, April, https://eur-lex.europa.eu/eli/reg/2016/679/oj
(last access: September 13, 2018).
8 Schmitt, C., Freitag, A., and Carle, G. (2013). CoMaDa: An Adaptive Framework
with Graphical Support for Configuration, Management, and Data Handling Tasks
for Wireless Sensor Networks; 9th International Conference on Network and Ser-
vice Management (CNSM), IFIP, Zurich, Switzerland, ISBN: 978-3-901882-53-1, pp.
211–218, October 2013.
9 Schmitt, C., Strasser, T., and Stiller, B. (2016). Third-party-independent Data Visual-
ization of Sensor Data in CoMaDa; 12th IEEE International Conference on Wireless
and Mobile Computing, Networking and Communications, New York, NY, USA, pp.
1–8, October 2016.
10 Silvestri, N. (2017). WebMaDa Extension Addressing Transparency Request for Data
Owners; Assignment, Communication Systems Group, Department of Informatics,
University of Zurich, Zurich, Switzerland, July 2017.
11 Schmitt, C., Anliker, C., Stiller, B. (2017). Efficient and Secure Pull Requests for
Emergency Cases Using a Mobile Access Framework; Managing the Web of Things:
Linking the Real World to the Web, In: M. Sheng, Y. Qin, L. Yao, and B. Benatallah
(Eds.), Morgen Kaufmann (imprint of Elsevier), Chapter 8, pp. 229–247, ISBN:
978-0-12-809764-9, February.
12 Das, A.M. (2009). Two-factor user authentication in wireless sensor networks. IEEE
Transactions on Wireless Communications 8 (3): 1086–1090, March.
13 Chen, T.H., and Shih, W.K. (2010). A robust mutual authentication protocol for
wireless sensor networks. ETRI Journal 32 (5), October.
14 Turkanovic, M., Brumen, B., and Hölbl, M. (2014). A novel user authentication and
key agreement scheme for heterogeneous ad-hoc wireless sensor networks, based on
the Internet of Things notion. Ad Hoc Networks 20: 96–112, April.
15 Amin, R., and Biswas, G.P. (2016). A secure light weight scheme for user authenti-
cation and key agreement in multi-gateway based wireless sensor networks. Ad Hoc
Networks 36: 58–80, January.
185
Part IV
10
Abstract
Key agreement between two constrained IoT devices that have never met each other is an
essential feature to provide in order to establish trust among its users. Physical Unclonable
Functions (PUFs) on a device represent a low-cost primitive exploiting the unique random
patterns in the device allowing it to generate a unique response for a given challenge. These
so-called challenge-response pairs (CRPs) are first shared with the verifier and later used
in the authentication process. The advantage of a PUF at the IoT is that even when the
key material is extracted, an attacker cannot take over the identity of the tampered device.
However, in practical applications, the verifier, orchestrating the authentication among the
two IoT nodes, represents a cluster node in the field, who might be vulnerable for corruption
or attacks, leading to the leakage of the CRPs. Possessing a huge number of CRPs allows its
usage in machine learning algorithms reveal the behaviour of the PUF.
Therefore, in this chapter we propose a very efficient method to provide authentication
between two IoT devices using PUFs and a common trusted cluster node, where the CRPs
are not stored in an explicit way. Even when the attacker is able to get access to the database,
the stored information related to the CRPs will not be usable input for any type of learn-
ing algorithm. The proposed scheme uses only elliptic curve multiplications and additions,
instead of the compute intensive pairing operations as an alternative scheme recently pro-
posed in the literature.
10.1 Introduction
Authentication between two IoT devices that have never met before is a frequently
occurring problem. For instance, consider the following healthcare situation of a patient
in a hospital room [1]. Suppose the patient is wearing a bracelet for blood pressure. In
case of measurements above a certain threshold, the alarm button in the room should
send a signal to the nurses. The communication between the bracelet and alarm button
over the Internet and on local networks needs to be secured to gain trust and acceptance
and to avoid direct physical harm to the patient, even loss of life. Both the bracelet and
the alarm button are not authenticated before, but should be able to generate in a very
efficient way trusted security material with the help of a common trusted verifier node,
acting as a gateway.
In 2001, Physical Unclonable Functions (PUFs) were introduced as an interesting
cryptographic primitive [2] and can be seen as the hardware equivalent of a one-way
function. A silicon PUF is a physical entity embodied in a physical structure that is
easy to fabricate but practically impossible to clone, duplicate or predict, even if the
exact manufacturing process is produced again. Instead of using a private key that
is linked to the device identity, the authentication of PUFs is based on the usage of
so-called challenge-response pairs (CRPs). The electrical stimulus, called the challenge
(C), is applied to the physical structure in order to react, called the response (R), in an
unpredictable manner due to the complex interaction of the stimulus with the physical
micro-structure of the device, which is dependent on physical factors introduced
during the manufacturing process in an unpredictable and uncloneable manner. PUFs
have relatively low-hardware overhead and are thus very interesting in an IoT context.
In [3, 4] a list is provided of process parameter variations potentially impacting the
delay and leakage characteristics of Complementary Metal Oxide Semiconductor
(CMOS)-based digital circuits, which can be used as PUF.
PUFs on devices have already been applied for device identification and authen-
tication, binding hardware to software platforms, secure key storage, keyless secure
communication, etc. Figure 10.1 illustrates a straightforward usage of PUFs for device
identification and authentication as the PUFs can be seen as the unique fingerprint of the
device. A security protocol is called a PUF-based protocol when at least one of the enti-
ties is able to construct PUF challenges and responses, which are used in the rest of the
protocol.
We assume for our construction the existence of a PUF mechanism in both devices
willing to authenticate each other. Moreover, instead of the devices communicating
directly with a common authentication server storing all CRPs of the devices, we also
consider the existence of local cluster nodes, acting as verifier nodes for the two IoT
devices in the field. The cluster nodes are responsible for requesting the required
security information of the authentication server, where the security information does
not include explicit CRP data which can potentially be abused later on in any kind of
learning algorithm. We show that our proposed PUF-based protocol is very efficient,
compared to state-of-the-art schemes presented in literature.
Authentic
device ?
Figure 10.1 Example of PUF usage for device identification (C = Challenge, R = Response)
PUF-Based Authentication and Key Exchange for Internet of Things 189
The second type of key material, which can be used in these key agreement protocols,
are the PUF-based challenges and responses. The main advantage with PUF-based key
material is that the attacker cannot take over the identity of a tampered device, whose
key material has been extracted. There exists multiple PUF-based key agreement proto-
cols for device to server in the literature. In [15], 21 server-device/token key agreement
protocols have been classified with respect to the features, device authenticity, server
authenticity, device privacy, leakage resilience, number of authentications, resistance to
noise, modelling resistance, denial of service (DoS) prevention, and scalability. It has
been shown that only a very limited number are able to satisfy these features at a rea-
sonable level. The main problems were vulnerability for DoS attacks, replay attacks,
impersonation attacks, and synchronization problems. In the lightweight category of
proposals are the Slender PUF, [16] noise bifurcation [17] and PUF-lockdown protocol
[18] retained, while in the non-lightweight category only Reference protocol II-A [15]
and the protocol proposed by Sadegi et al. [19]. The main difference between these pro-
tocols [15–19] and our PUF-based protocol is that these protocols take the noisiness
of the PUF into account, while our protocol considers the usage of a strong and con-
trolled PUF. Moreover, [16, 17] also take countermeasures to offer resistance against
machine-learning attacks, although this cannot be completely excluded [15]. The pro-
posed protocol in [18] prevents an attacker from querying a token for CRPs that has
not yet been disclosed during a previous protocol run. The main weakness of [19] is
that it does not scale well, as the server needs to exhaustively evaluate a pseudo-random
function for each registered token.
Another method for key agreement with the usage of PUFs is described in [20]. Here,
the private key of the device is securely stored using a PUF construction. During the
first communication message, the certificate issued by the manufacturer needs to be
included. This approach is interesting, but strongly relies on the trustworthiness of
the manufacturer, which is, in many cases, not verifiable by the device. In [21], the
concept has been explained how PUFs, in combination with Blockchains, are able to
establish authentication for IoT devices. Although the idea is promising, the impact of
Blockchains on the performance of IoT devices is not fully clear for the moment.
key agreement protocols with an active involvement of the TTP. Such protocol using
classical public key cryptography mechanisms is evident, assuming that the TTP stores
the list of valid identities and corresponding public keys of the participating IoT devices.
Note that this scheme will be used as a benchmark to also compare the efficiency of our
proposed scheme.
For the PUF-based key agreement protocols between two IoT nodes with the aid of a
common server (taking the role of TTP), who has stored the challenge-response pairs
of the PUFs from the different nodes, Chatterjee et al. recently proposed a protocol in
[25]. The public keys of the devices are generated using the PUF results, followed by an
identity-based encryption mechanism for the actual secure communication. In [27], we
show that their protocol is not resistant against man-in-the-middle, impersonation, and
replay attacks. In addition, we present an alternative PUF-based protocol for the key
agreement phase, which is even more efficient. In order to overcome the weakness of
CRP leakage at the authentication server in case an attacker manages to get access to the
database, Chatterjee et al propose in [26] a new version of the authentication protocol.
In this chapter, we build further on the architectural model proposed in [26], but develop
a slight modification of the scheme from [27] in order to also enable resistance against
CRP leakage. Our proposed scheme is very efficient compared to [26], as we do not
require compute-intensive pairing operations.
10.3 Preliminaries
10.3.1 System Architecture
In [26], Chatterjee et al. introduced a cluster node in the field to perform the authenti-
cation between the two IoT devices, instead of the central authentication server super-
vising the different IoT nodes as in [25, 27]. This is a more realistic scenario given the
storage requirements of the authentication server. Therefore, we consider the similar
architecture and protocol phases as in [26]. Consequently, the scheme consists of a reg-
istration phase, security association and authentication and key agreement phase. Note
that we do not discuss the final secure communication phase, as this process is similar as
in [27] and only relies on a signcryption scheme based on the ECQV scheme. Figure 10.2
depicts the system architecture and the different phases in the system.
– In the registration phase, both IoT device and cluster node register with the authen-
tication server, which is considered to be a TTP and fully trusted. This phase is
assumed to be performed in a trusted and secure environment, e.g., by physical
contact between the trusted authentication manager and the devices. For the IoT
node, the identity ID and a set of challenges C with corresponding hash of the
responses H(R) are shared with the TTP. The cluster node shares its identity IDS ,
public key PS and a common shared secret KS with the TTP. The corresponding
secret key dS is securely stored in the cluster node.
– Upon request of the cluster node IDS for authentication of a certain IoT node IDA ,
the security association process is activated. Here, the Secure Association Provider
(SAP) requests an entry of the TTP involving both IDA , IDS , containing an implicit
CRP, which is uniquely coded to become usable for IDS in the authentication process
and which is not leaking explicit information on the behavior of the PUF.
192 IoT Security: Advances in Authentication
Registration
TTP
IoT Node Cluster node (CN)
IoTA: IDA,(CA,H(RA)) CN1: IDs,Ks,Ps
IDs, Ps
C,H(R) IoTB: IDB,(CB,H(RB)) CN2: ... IDs,Ks,Ps Ks, ds
PUF
C R
Authentication
Cluster node (CN)
IoT 1 Request IoT 2
IDs, Ps
PUF Ks, ds PUF
C R C R
Key agreement
– In the authentication and key agreement phase, two nodes, registered to the same
TTP and in the same communication range of a CN, are able to generate a private
and public key pair. The public key of the one node is shared with the other with the
help of the CN to guarantee the authenticity.
10.3.2 Assumptions
Taking into account the described system architecture, we consider the following
assumptions in the system.
– The registration phase of both the IoT nodes and the CNs happens in a trusted and
secure environment. The TTP is completely honest and stores the data with the
highest security standards, being regularly audited by third parties. Consequently,
no attacker is able to derive information at this stage or at the level of the TTP.
– The communication between TTP, SAP, CN and IoT can run over insecure channels.
– The CN possesses non-volatile memory to store at least its private key ds and its com-
mon shared key KS with the TTP. No attacker is able to retrieve this information.
– The CN is considered to be honest but curious. In this scenario, the CN performs all
the required actions, but might be interested in abusing some of the information in
order to sell it to third parties.
– The PUF designed in the IoT is inaccessible and cannot be predicted by the attacker
as it is an implicit property of the device.
later stage. The second goal of the attacker can be to directly impersonate a registered
and legitimate IoT node without possessing the node and thus to derive a key with
another unaware registered and legitimate IoT device. As the CN is considered to be
honest but curious, the attacker can also corrupt the CN in order to derive information
on either the CRPs or the key derived by the IoT nodes.
We consider the Dolev-Yao attack model [29]. Here, the attacker is able to eavesdrop
on the traffic, inject new messages, replay and change messages, or spoof other iden-
tities. Consequently, the attack is only limited by the constraints of the cryptographic
methods used. We may assume that the attacker carries the message.
In practice, eavesdropping, intercepting and modifying data are activities that can be
launched at any point where the traffic passes, from the IoT device to the authentication
server. Some examples of how this can happen are as follows:
– In a local network:
• Anyone who is connected to the same Wi-Fi is able to read the traffic.
• If the router (or some other part of the network) is hacked, the hacker can read and
modify the traffic.
• The person that legitimately controls the network, e.g., the person responsible for
the authentication of the server, can read and modify the traffic without even hav-
ing to hack anything.
– Over the internet:
• The Internet Service Provider (ISP) is able to read and modify all the traffic, since
it controls the hardware it passes through. The traffic can also go through other
networks owned by unknown companies, eventually from different countries, and
those who can also read and modify the traffic.
• When a nation state hands over to a court one of these companies passing the
traffic, it can also read and modify the data (e.g., NSA).
10.3.4.1 PUFs
There are two types of PUFs, strong and weak. The difference is related to the number
of responses that can be generated. A strong PUF is able to generate a large amount of
challenge-response pairs, while for a weak PUF, the number is limited, often to one.
The practical realisation of a strong PUF is challenging. PUFs also have problems for
stabilizing the noise when generating the responses. In order to solve this issue, error
correcting codes and assisting computed helper data are required. A good construc-
tion of both is essential to avoid leakage of information and resistance against fault and
reliability attacks.
Recently, [28] proposes the construction of PUF-FSM, a controlled strong PUF
without the need for error correcting codes and helper data by only using the error-free
responses, which are fed in a finite state machine. In [26], a 5-4 double arbiter PUF,
consisting of five 64-bit Arbiter PUF instances, together with a BCH encoder and
decoder has been designed. Here, besides the challenge also helper data needed to be
accompanied.
194 IoT Security: Advances in Authentication
We do not focus on the design of a PUF in this paper, but assume the usage of
such type of PUF-FSM in our protocol. So, we are able to generate a large amount
of challenges and responses in a controlled way. When using the PUF-FSM, we can
assume that the PUF evaluation behaves as a random oracle. Consequently, in our
protocol, we do not integrate the helper data. In case a PUF requiring helper data
like in [26] is used, the helper data should be dealt with in the same way as the
challenge.
Node 1 CN
IDA IDB T S1
−−−−−−−−−−→
Contact SAP and get info
CA2 = CA2 ⊕ H(RA1 T S1 IDB )
h1A = H(CA1 CA2 T S1 )
CB2 = CB2 ⊕ H(RB1 T S1 IDA )
h1B = H(CB1 CB2 T S1 )
CA1 C
A2 h1A PS
←−−−−−−−−−−−−
Derive RA1
CA2 = CA2 ⊕ H(RA1 T S1 IDB )
Check h1A
Derive RA2
qA ∈ F q , QA = q A P
h2A = H(RA1 RA2 T S1 IDB QA )
h2A QA
−−−−−→
Check h2A , h2B
q S ∈ Fq , Q S = qS P
cA = QA + QS
cB = QB + QS
rA = H(cA T S1 IDA IDB )qS + dS
rB = H(cB T S1 IDA IDB )qS + dS
PA = H(cA T S1 IDA IDB )cA + Ps
PB = H(cB T S1 IDA IDB )cB + Ps
h3A = H(RA1 RA2 rA cA cB PA PB )
h3B = H(RB1 RB2 rB cB cA PA PB )
r c c h
A
←−−−A−−−
B
−−3A
−−
dA = H(cA T S1 IDA IDB )qA + rA
PA = dA P
PB = H(cB T S1 IDA IDB )cB + Ps
Check h3A
with the corresponding stored timestamp. The verification of h2A , h2B ensures the
integrity and authenticity of both nodes. If it is correct, it starts with the derivation of
the certificates for both nodes. Therefore, it randomly chooses a variable qs ∈ Fq and
computes QS = qs P. Next, the two certificates of the nodes are computed as cA and
cB :
c A = QA + Qs
c B = QB + Qs
These certificates are used to compute the auxiliary information rA , rB for Node 1
and Node 2 to compute their private and public key pair respectively. Recall, that
(ds , Ps ) is the private-public key pair of the server, where Ps has been initially already
transmitted by the CN.
rA = H(cA ||TS1 ||IDA ||IDB )qs + ds
rB = H(cB ||TS1 ||IDA ||IDB )qs + ds
The corresponding public keys PA , BB of the nodes 1 and 2 respectively are derived as
follows:
PA = H(cA ||TS1 ||IDA ||IDB )cA + Ps
PB = H(cB ||TS1 ||IDA ||IDB )cB + Ps
In addition, to guarantee the integrity of the communication, the values h3A , h3B are
also computed.
h3A = H(R′A1 ||R′A2 ||rA ||cA ||cB ||PA ||PB )
h3B = H(R′B1 ||R′B2 ||rB ||cB ||cA ||PA ||PB )
The values rA , cA , cB , h3A are sent to Node 1. In the same way, the values rB , cB , cA , h3B
are sent to Node 2. The stored session is now closed at the server side.
– When a message of four parameters of expected length is received, Node 1 opens
the stored session(s) where the current timestamp is in a reasonable timeframe
with the stored timestamp. It starts with the computation of its private key
dA = H(cA ||TS1 ||IDA ||IDB )qA + rA . Its public key PA equals to dA P, but also to
PA = H(cA ||TS1 ||IDA ||IDB )cA + Ps
as derived by the CN. The private key is only known by the node itself as the random
number qa derived in the previous step is required. Using cB , Node 1 is able to com-
pute the public key PB of Node 2. Note that this mechanism is based on the ECQV
Implicit Certificate Scheme [13]. Finally, Node 1 checks the hash value h3A . If OK,
both nodes close the stored session and open a new session storing its private and
public key pair together with the public key and identity of the other node.
– Integrity. Integrity is obtained in every step of the protocol since every message con-
tains a hash, which includes the other parts (or derivations of it) of the message.
– Authentication of the Node. The nodes are authenticated if the check on the values
h2A , h2B are correct. These hash values contain the responses on the challenges, which
can only be generated by the node possessing the PUF.
– Authentication of the Server. The server is authenticated by the node in both received
messages. In the first received message by Node 1, the value h1A , computed by the
server, includes C2A , while this value is not part of the received message. Instead, C2A
is masked by a hash value, which includes information on the response on the first
challenge. Consequently, as only the CN is aware of the information of the response,
Node 1 is ensured that the CN has sent the message. Moreover, the validity of the
public key of the CN is also checked as it is included in the value R′A1 , containing
the information of the response and generated by the TTP. If the computation of
R′A1 , R′B1 by Node 1 and Node 2 respectively is similar to the stored value with the CN,
the nodes are sure that the transmitted public key corresponds to the authentic one
validated by the TTP.
In the second received message, the hash value h3A is included. This hash value con-
tains the responses on the two challenges, which is only known by the server. In
addition, by adding the public keys of the two nodes into the hash, it also allows the
nodes to verify the success of the process. Due to the symmetry of the protocol, the
same reasoning holds for Node 2.
– Resistance against man-in-the-middle attacks. As the authenticity of the sender is
verified by the receiver in each step of the protocol, resistance against man-in-the
middle attacks is guaranteed.
– Resistance against impersonation attacks. Even if Node 1 is malicious, it is not possible
for the node to derive information on the challenge-response pairs of the other node
from the messages exchanged between the CN and Node 2. This follows on from the
fact that only hash values on the responses are included in the messages, which do
not leak any information.
Also the CN cannot be impersonated as both keys KS , dS are required to success-
fully perform the process. These keys are stored in the tamper-resistant part of the
memory. The key KS is necessary to derive the information of the CRPs. The key dS
is required to construct the private and public key pair of each node. Moreover, the
public key PS cannot be repudiated or changed as it is also embedded in the responses
computed by the TTP during the security association phase. If dS were not used, the
node cannot verify the authentication of that particular CN as it could also be another
registered CN.
– Resistance against replay attacks. Replay attacks are avoided, due to the usage of the
timestamp TS1 , which is included in all the hashes of the different transmitted mes-
sages and in the information of the responses on the selected challenges.
– Protection against denial of service attacks. Besides the first message, both the nodes
and server can check at each step of the key agreement scheme the integrity and
authentication by verifying the hash included in the messages. Consequently, in case
a huge amount of false messages flow over the network, it will be very quickly discov-
ered by each entity. Note that this feature is not present in [26] as in their scheme only
in the last step is the IoT able to verify the validity. Consequently, in [26] an attacker
PUF-Based Authentication and Key Exchange for Internet of Things 199
can create a large amount of open sessions at each entity, where it is impossible to
filter out the legitimate messages without finalizing the complete process.
10.6 Performance
Both the computational and communication costs are considered. We compare the effi-
ciency of our solution with [26] and [27], as these are the only secure PUF-based pro-
tocols in the literature with comparable architecture, i.e., deriving a common secret key
between two IoT devices. Note that [26] has the additional advantage that no informa-
tion on CRPs is leaked, compared to [27], and thus [26] offers the same security features
as our proposed scheme.
For the key agreement scheme, which is based on the existence of PUFs, we utilize a
straightforward public key variant as a benchmark, taking into account a similar archi-
tecture as this scheme and [26]. The different steps to be performed in the benchmark
scheme are presented in Figure 10.4. In this scheme, we assume that the TTP stores the
identity and public key of each of the registered IoT devices, instead of the CRPs. The
IoT devices possess the public key PTTP of the TTP. Denote the private-public key pairs
of Node 1, Node 2, and CN by (dA , PA ), (dB , PB ) and (ds , Ps ) respectively. The signature
operation on a message M with private key d is denoted by sigd (M), while the verification
of the signature S with public key P is denoted by verP (S). We assume the application of
the Schnorr signature scheme for the complexity analysis of the next paragraph.
Node 1 CN Node 2
Choose rA ∈ Fq
RA = rA P
A ID ID R T S
B A
−−−−−−−−−−−−→
Check TTP and receive
PA , PB , s = sigdT T P (Ps T S)
Com.Req.IDA T S
−−−−−−−−−−−−−→
Choose rB ∈ Fq
RB = rB P
RB IDA T S
←−−−−−−−−−
KA = H(ds RA T S)
KB = H(ds RB T S)
CA = EKA (PB T S)
CB = EKB (PA T S)
A C T Ss C T Ss
←−−−−−− −−B−−−−→
verPT T P (s) verPT T P (s)
KA = H(rA Ps T S) KA = H(rB Ps T S)
PB T S = DKA (CA ) PA T S = DKB (CB )
Figure 10.4 Key agreement scheme based on public key cryptography used as benchmark
200 IoT Security: Advances in Authentication
Table 10.1 Comparison of computational cost in key agreement phase for IoT device
P 0 1 0 0
HP 0 1 0 0
EM 3 2 3 2
EA 1 2 1 0
S 0 0 0 2
H 10 6 10 2
PUF operation as this is highly dependent on the underlying system. We note that in our
scheme and [27], two PUF evaluations are used in order to validate the authentication
of the request after each step. In [26], only one PUF evaluation is included, having the
disadvantage that the authentication of the request can only be verified at the very end
of the scheme. Without loss of security (besides intermediate authentication validation),
we can easily remove the parameters CA2 ′
, CB2
′
, also resulting in one PUF evaluation at
the IoT node. However, as we believe that this additional check is an added value of the
scheme, we will not use this adaptation in the discussion of the performance.
Tables 10.1 and 10.2 compare the number of operations and the corresponding result-
ing time between our scheme and the ones of [26, 27] and the benchmark scheme (BM)
for the key agreement scheme in the IoT node and CN respectively, excluding the PUF
evaluations. For the computation of the timings of both protocols, we have considered
the numbers derived in [33], where all the operations have been evaluated on a personal
computer with an Intel I5-3210M 2.5 GHz CPU and Windows 7 operating system. The
cryptographic operations have been implemented using the MIRACL cryptographic
library. We have also assumed that there is only one stored session at the nodes and
server side, similar to that in [26].
As can be concluded from the table, our proposed protocol is considerably faster from
the node and the server side, compared to [26]. The main difference between our scheme
and [26] is that we do not need to compute the intense hash-to-point and pairing oper-
ations. With respect to [27], the performance at the node side is approximately similar,
but there is a small degradation in time at the server side. With respect to the pub-
lic key-based benchmark scheme, we can conclude that the difference in timing at the
node side is acceptable, and there is even a small win for the timing at the server side.
This is the price to pay for being resistant against hacking.
P 0 2 0 0
HP 0 2 0 0
EM 3 6 1 4
EA 4 10 2 1
S 0 0 0 1
H 10 6 10 2
is also the length of the result of the hash value. As a consequence, the resulting sizes of
the transmitted messages by both the node and the server in the key agreement protocol
are enumerated in Table 10.3.
It can be concluded that the communication cost from the IoT node is slightly worse
than the benchmark algorithm and equal to the system of [27]. It is almost twice as
efficient compared to [26]. From the server side, again the benchmark algorithm outper-
forms all other schemes. Here, our scheme is the least optimal. However, if we remove
one PUF evaluation, as discussed before, we are able to reach the same efficiency as [26].
Our scheme and the ones of [26, 27] have the same structure and thus the same number
of exchanged messages, being four between Node 1 and Server and three between Node
2 and server. These numbers are one lower in case of the benchmark key agreement
scheme.
10.7 Conclusions
We have presented in this chapter a highly efficient authentication algorithm for two
IoT devices containing a PUF implementation. The main advantage of including a PUF
mechanism is that the security of the devices is guaranteed even if they become com-
promised as there are no secret keys stored. An interesting feature of our system is that
neither the attacker eavesdropping the channel, nor the SAP or CN, is able to learn more
202 IoT Security: Advances in Authentication
about the structure of the CRPs in order to collect pairs for building a learning algorithm
to reveal the behavior of the PUF.
We have compared the efficiency of the scheme with a straightforward public
key-based mechanism and could conclude that the performance difference between
both is small. We have also shown that the scheme outperforms similar systems in
literature.
References
1 Kumar, T.; Braeken, A.; Liyanage, M.; Ylianttila, M. (2017). May. Identity privacy
preserving biometric based authentication scheme for Naked healthcare environ-
ment. 2017 IEEE International Conference on Communications (ICC), Paris, France
(21–25 May 2017). IEEE.
2 Pappu, S.R. (2001). Physical One-Way Functions. Ph.D. Thesis. Massachusetts Insti-
tute of Technology.
3 Blaauw, D., Chopra, K. Srivastava, A. and Scheffer, L. (2008). Statistical timing anal-
ysis: From basic principles to state of the art. IEEE Transactions Computer Aided
Design Integrated Circuits Systems 27 (4): 589–607.
4 Abu-Rahma, M.H. and Anis, M. (2007). Variability in VLSI circuits: Sources and
digns considerations. Proc. IEEE International Symposium Circuits Systems, Los
Alamitos, USA (27–30 May 2007). IEEE.
5 Zheng, Y. (1997). Digital Signcryption or How to Achieve Cost (Signature & Encryp-
tion) ≪ Cost (Signature) + Cost (Encryption). Annual International Cryptology Con-
ference, Berlin, Germany (17–21 August 1997). Springer.
6 Braeken, A., Shabisha, P., Touhafi, A. and Steenhaut, K. Pairing free and implicit
certificate based signcryption scheme with proxy re-encryption for secure cloud data
storage. CloudTech; IEEE, Rabat, Morocco (24–26 October 2016).
7 Tashi, J.J. (2014). Comparative analysis of smart card authentication schemes. IOSR
Journal of Computer Engineering (16): 91–97.
8 Braeken, A. (2015). Efficient anonymous smart card-based authentication scheme for
multi-server architecture. International Journal of Smart Homes 9: 177–184.
9 Shamir, A. (1984). Identity-Based Cryptosystems and Signature Schemes. Workshop
on the Theory and Application of Cryptographic Techniques, Paris, France (9–11
April 1984). Springer.
10 Al-Riyami, S.S. and Paterson, K.G. (2003). Certificateless Public Key Cryptogra-
phy. International Conference on the Theory and Application of Cryptology and
Information Security, Taipei, Taiwan (30 November–4 December 2003). Springer.
11 Gentry, C. (2003). Certificate-Based Encryption and the Certificate Revocation Prob-
lem. International Conference on the Theory and Applications of Cryptographic Tech-
niques, Warsaw, Poland (4–8 May 2003). Springer.
12 Braeken, A., Liyanage, M. and Jurcut, A.D. (2019). Anonymous Lightweight Proxy
Based Key Agreement for IoT (ALPKA). Wireless Personal Communications,
pp.1–20.
13 Certicom Research. (2013). SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate
Scheme, Standards for Efficient Cryptography Group. Version 1.0. http://secg.org/
sec4-1.0.pdf (accessed 25 June 2019).
PUF-Based Authentication and Key Exchange for Internet of Things 203
14 Porambage, P., Schmitt, C., Kumar, P. et al. (2014). Two-phase Authentication Proto-
col for Wireless Sensor Networks in Distributed IoT Applications. Proceedings of the
2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul,
Turkey (6–9 April 2014) IEEE.
15 Delvaux, J. (2017). Security Analysis of PUF-Based Key Generation and Entity
Authentication. Ph.D. Thesis, Katholieke Universiteit Leuven.
16 Rostami, M., Majzoobi, M., Koushanfar, F. et al. (2014). Robust and
reverse-engineering resilient PUF authentication and key-exchange by substring
matching. IEEE Transactions Emerging Topics in Computing 2 (1): 37–49.
17 Yu, M.D. Verbauwhede, I. Devadas, S. and M’Raihi, D. (2014). A noise bi-furcation
architecture for linear additive physical functions. Proceedings of the 2014 IEEE
International Symposium on Hardware-Oriented Security and Trust (HOST),
Arlington, USA (6–7 May 2014). IEEE.
18 Yu, M.D., Hiller, M., Delvaux, J. et al. (2016). A lockdown technique to prevent
machine learning on PUFs for lightweight authentication. IEEE Transactions Multi-
scale Computer Systems 2: 146–59.
19 Sadeghi, A.R., Visconti, I. and Wachsmann, C. (2010). Enhancing RFID security and
privacy by physically unclonable functions. In: Towards Hardware Intrinsic Security
–Foundations and Practice (eds. A.R Sadeghi and D. Naccache), 281–305. Berlin,
Germany: Springer.
20 Tuyls, P. and Batina, L. (2006). RFID-Tags for Anti-counterfeiting. Topics in
Cryptology|CT-RSA 2006, San Jose, USA (13–17 February 2005). Springer.
21 Guartime and Intrinsic ID. (2017). Internet of Things Authentication: A Blockchain
solution using SRAM Physical Unclonable Functions. https://www.intrinsic-id.com/
wp-content/uploads/2017/05/gt_KSI-PUF-web-1611.pdf (accessed 25 June 2019).
22 Simplicio, M.A., Jr., Silva, M.V., Alves, R.C. and Shibata, T.K. (2017). Lightweight
and escrow-less authenticated key agreement for the internet of things. Computer
Communications 98: 43–51.
23 Wouters, P., Tschofenig, H., Gilmore, J. et al. (2014). T. RFC 7250|Using Raw Public
Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security
(DTLS), June 2014. https://www.rfc-editor.org/rfc/rfc7250.txt (accessed 25 June
2019).
24 Ha, D.A., Nguyen, K.T. and Zao, J.K. (2016). Efficient authentication of
resource-constrained IoT devices based on ECQV implicit certificates and datagram
transport layer security protocol. Proceedings of the Seventh Symposium on Informa-
tion and Communication Technology, Ho Chi Minh City, Vietnam (8–9 December
2016).
25 Chatterjee, U., Chakraborty, R.S. and Mukhopadhyay, D. (2017). A PUF-Based
Secure Communication Protocol for IoT. ACM Transactions on Embedded Comput-
ing Systems 16: 67.
26 Chatterjee, U., Govindan, V., Sadhukhan, R. et al. (2018). Building PUF based
Authentication and Key Exchange Protocol for IoT without Explicit CRPs in Ver-
ifier Database. IEEE Transactions on Dependable and Secure Computing (TDSC)
99: 1–1.
27 Braeken, A. (2018). PUF Based Authentication Protocol for IoT. Symmetry 10 (8):
352.
204 IoT Security: Advances in Authentication
28 Gao, Y., Ma, H., Al-Sarawi, S.F. et al. (2017). PUF-FSM: A Controlled Strong PUF.
IEEE Transactions on Computer-Aided Design of Integrated Circuits Systems 30 (5):
99.
29 Dolev, D. and Yao, A. (1983) On the security of public key protocols. IEEE Transac-
tions on Information Theory 29: 198–208.
30 Hankerson, D., Menezes, A.J. and Vanstone, S. (2003). Guide to Elliptic Curve Cryp-
tography. New York, NY: Springer.
31 SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Research, Stan-
dards for Efficient Cryptography Version 1.0, September 2000. http://secg.org/sec2-
v2.pdf (accessed 25 June 2019).
32 Recommended Elliptic Curves for Federal Government Use, National Institute of
Standards and Technology, August 1999. http://csrc.nist.gov/groups/ST/toolkit/
documents/dss/NISTReCur.pdf (accessed 20 November 2018).
33 He, D., Zeadally, S., Wang, H. and Liu, Q. (2017). Lightweight Data Aggre-
gation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve
Cryptography. Wireless Communications and Mobile Computing 2017: 1–11.
doi:10.1155/2017/3194845.
205
11
Abstract
We present an encryption and authentication scheme suitable for ASIC or FPGA hardware
implementation, which is based on the generalized synchronization of systems showing
chaotic dynamical behavior. The scheme consists of a single-driver system, which provides
two identical driven systems with a complex waveform. The driven and driving systems
synchronize with correlation no higher than 1.2%. A bit-stream derived from their outputs
is then used as an encryption or authentication key. The security of the scheme is based on
the fact that it is easy to generate the response of the complex systems, given an input, but
hard to do a system identification. Furthermore, the spectrum of the signals of the driver
and driven system reveals no information. We show that regardless of their initial state, the
distant receivers synchronize within a short time, relative to their internal timescale. We
validate the bit-streams generated by the driver using the NIST test suite for randomness
and have found no deviations. Finally, we provide pointers as to the practical implementa-
tion and application of the presented scheme.
11.1 Introduction
Although the Internet of Things (IoT) promises to bring enormous benefits, the risks
associated with it cannot be ingnored or underestimated. Take for example, the security
risks associated when hackers are able to read a home’s thermostat settings, identifying
exactly if the occupants are at home or not. Or possibly disastrous: a hacker having
access to the braking system of a (self-driving) car. The potential risks associated
with wireless enabled pacemakers and other implantable medical devices do not even
need to be explained. While offering the huge benefit of remote diagnostics, at the
same time, malignant access goes far beyond just a privacy breech and is potentially
life-threathening. Many current IoT devices have relatively weak security capabilities
and are easy entry points for hackers. The reasons for this exacerbated cybersecurity
risks are plenty. First of all, there is no real form of standardization, let alone a legal
framework to adhere to, yet. Each device still speaks its own ‘language’, following its
own custom protocols, making it very hard for the network to know which devices to
really trust. Also, the cost of building extra security into these basic devices is often too
IoT Security: Advances in Authentication, First Edition.
Edited by Madhusanka Liyanage, An Braeken, Pardeep Kumar, and Mika Ylianttila.
© 2020 John Wiley & Sons Ltd. Published 2020 by John Wiley & Sons Ltd.
206 IoT Security: Advances in Authentication
high for commercial purposes. In an industrial context, a big increase in the number
of sensors and devices that are being connected can be seen, creating a huge potential
attack surface. Typically, such industrial IoT consists of decades-old equipment and
control systems that were never designed for exposure to the Internet and to its
security risks. Together with an insufficient budget for implementing cybersecurity
awareness, monitoring, and prevention technology, this leads to an ever-growing
number and type of attacks. Therefore, the future of successful deployment and
acceptance of IoT-enabled applications depends critically on the availability of fast,
robust and low-power encryption and authentication methods. Fast in this context
equals low power by implementing short sleep/wakeup/sleep cycles. The encryption
and authentication methods used should not require much real-estate on the chip to
be low cost. Hardware-based methods will be preferred over software-based to offload
the main processor and provide encryption that is transparent at the application level.
In this Chapter, we will therefore propose a cost-effective lightweight hardware-
entangled security solution for IoT systems. However, our proposed solution can also
be employed in other security contexts. The development of new strategies to protect
sensitive information from interception and eavesdropping has been receiving signifi-
cant attention, also in our present-day worldwide communication networks. Generally
speaking, the aim of our work is the development and implementation of a novel
random key distribution system based on the concept of generalized synchronization
between distant elements in large networks. Such a random key synchronization
system can have a significant impact in the field of physical layer-based encryption
techniques, offering not only high confidentiality but also potentially high-speed
real-time encryption and decryption. Here, we put forward a scheme fit for a fully
digitalized implementation.
Nowadays, confidentiality and the authenticity of information are mostly ensured
through mathematical algorithms. Algorithmic key-based encryption systems usually
take a digital data stream and convolute it with a given binary pattern, which we refer
to as the key. The resulting encrypted binary string can then be transmitted through
a public communication channel. A classic example of this type of encryption is the
Vernam cipher [1], where the recipient decodes the message using the same key-string
code as used for encryption. In this case, the key is agreed via another secure channel.
This algorithm has been mathematically proven to be totally secure if the key is fully
random, has the same length as the message and is used only once. This so-called
one-time pad cryptography is, however, not suited for secure communications between
two parties who have not been able to exchange encryption keys beforehand. To
circumvent this drawback, other software cryptosystems relying on asymmetric-key
algorithms (public-key cryptography such as RSA) have been developed. However,
asymmetric algorithms use significant computational resources in comparison with
their symmetric counterparts and therefore are not generally used to encrypt bulk data
streams. Also, the effectiveness of these encryption techniques relies on the fact that it
is computationally hard (but not impossible) to decrypt a message knowing only the
public key. Therefore, the growing computational power and the fact that a key is used
more than once remains a latent threat for current algorithmic cryptography. In order
Hardware-Based Encryption via Generalized Synchronization of Complex Networks 207
data in a new way, with a high level of security and which can be built using current
off-the-shelf components [11]. This secure key distribution scheme was based on
synchronized random bit generation and relied on the synchronization between a
transmitter and a distant receiver through an uncorrelated chaotic driver signal. From
the synchronized chaotic signals, a random key can be distilled that would be extremely
difficult to reconstruct from the information shared in the public channel. This system
does not suffer from the drawbacks of PUFs nor from the drawbacks of standard vanilla
chaos encryption. In this chapter, we revisit this work and not only translate it to a fully
digital implementation but also demonstrate a novel easy-to-implement lightweight
random bit generator, that is based on a delay dynamical system.
In the next section, we introduce our general scheme and the chaotic driver, of which,
the dynamical behavior is investigated in detail. Then, in Section 11.3, we show how the
chaotic followers are built, giving pointers for further practical use. In Section 11.4 we
show how the drivers and followers can be combined to form a complete encryption or
authentication solution. Furthermore, we reason that a brute-force attack on this system
is futile. We wrap up our conclusions in Section 11.5, discussing ways in which this line
of research may go further.
Chaotic
driver
Key
Chaotic Chaotic
follower follower
bit bit
extract extract
Figure 11.1 Encryption scheme based on generalized synchronization between two driven chaotic
systems.
binary plaintext, via an XOR-operation. The probability of seeing a ‘1’-bit in the ensuing
encrypted message is:
P{encrypted = 1} = P{message = 1and key = 0} + P{message = 0 and key = 1}
= P{message = 1}P{key = 0} + P{message = 0}P{key = 1}
1 1
= P{message = 1} + P{message = 0}
2 2
1
= , (11.1)
2
since the bits of the message and the key are independent random variables. On the
receiver side, the signal of the driver causes a second follower (identical to the one on
the transmitter side) to generate the exact same signal. Thus, the bitstream derived from
this second follower exactly equals the bitstream of the follower in the transmitter. The
message is then recovered via an XOR-operation of the receiver-side bitstream and the
cyphertext. Understandibly, a two-way link can be built in the same way. A qualitative
requirement for such a scheme to be succesful is that it is computationally hard to iden-
tify the relation between the driver signal and the key bitstream.
In [11] this scheme was demonstrated using an analog electronics approach, as shown
in Figure 11.2a. The chaotic driver consisted of a series of nonlinear filter blocks (NLBs),
Figure 11.2b, with a non-monotonic response, Figure 11.2c, placed in a delay ring. Each
responder used four similar nonlinear filters in a chain. The main purpose of that work
was to illustrate how this scheme could be viable, yet there, as a final implementation, a
fast photonic link was envisioned. It is instructional to explain why delay is used in the
chaotic driver in Figure 11.2. First, in a photonic setting delay appears naturally by virtue
of the finite propagation speed optical signals have when travelling along an optic fiber. It
has long been known that delay can cause instabilities and even chaos in control systems.
This is also the case for semiconductor lasers subjected to delayed feedback [17], thus
210 IoT Security: Advances in Authentication
Gd
NLB d,1
NLB r1,1 NLB r1,2 NLB r1,3 NLB r1,4 υr1 = υr1,4
υd,1 υd =
υd,8 Gr Responder 1
..
delay
τ .
υd,7
Responder 2
NLB d,8
NLB r2,1 NLB r2,2 NLB r2,3 NLB r2,4 υr 2 = υr 2,4
Figure 11.2 a) System diagram of the driver and responders or followers of [11]. Each nonlinear block
(NLB) contains the subcircuit of Figure 11.2b. Pairwise NLB blocks in the responder chains were built
using matched components. b) A single nonlinear block. The transistor circuit provides a
non-monotonic “bump-like” function and is followed by a first-order filter and buffer. c) Response of a
NLB when slowly scanned.
state
15
k+8 input
+
k+7
+ +
– + z–1 k
k–1
8-Bit
permutation
table
N sample delay
Figure 11.3 A Delay-Filter-Permute (DFP) block. For autonomous operation, the input and associated
bit shifter in front of the permutation table are omitted.
Here, we illustrate how the same scheme can readily be adopted to a low-power and
resource limited digital setting, suitable for both encryption and authentication. We
begin by showing how a chaotic delay-based driver may be implemented in digital hard-
ware.
which is chosen at random, such that for x ≠ y we have Q(x) ≠ Q(y) and ∀y ∈
{0, 1}8 ∃x ∶ Q(x) = y. We did not need to place any special requirements on the
construction of the random permutation table to reach the results reported below.
If we exclude mapping values onto themselfves Q(x) = x (because this would make
the dynamical behavior less diverse), then it turns out there exists a staggering
(28 − 1)! ≈ 3.35 × 10504 choices to build this function. The delayed and permuted 8-bit
values are then bit-shifted to the left by m positions, i.e., multiplied by 2m . These are
added to a 16-bit “state” variable. By using an l-bit right-shift operation and a subtrac-
tion, a recursive lowpass filtering is performed on this state variable. The recursive
nature of this filter gives it some memory, allowing it to mix the states of several delayed
values. The input to the permutation table is given by the bitfield (k, k + 7) of the 16-bit
state variable, and these also form the key values of Figure 11.1. Several DFP blocks can
be coupled by averaging the (k, k + 7) bitfield with that originating from another DPF.
Another method is to simply to let the sum of the (k, k + 7) bitfields from two coupled
DPFs overflow, and use the least significant eight bits as input to the permutation table.
For autonomous operation, the input and divide-by-two shifter as shown in Figure 11.3
are omitted. In summary, the behavior of an autonomous DFP block answers to the
following equation:
sn+1 = sn − (sn ≫ l) + Q[(sn−N ≫ k) and 255] ≪ m, (11.3)
where s denotes the 16-bit state variable and the operation a ≫ b (a ≪ b) means shifting
the binary representation of a to the right (left) over b positions, which is equivalent to
dividing (multiplying) a by 2b , followed by rounding downwards to the nearest integer.
In Eq. (11.3), N is the length of the delay line and “and” stands for the bitwise and-ing
operation. Clearly, the DFP is readily integrateable in an ASIC, FPGA or as embedded
code. We note that a similar system, executed in two steps:
sn+1 = sn + Q[(sn−N ≫ k) and 255] ≪ m, (11.4)
1.0
60
state autocorrelation
50 0.8
40
state (× 103)
0.6
30
0.4
20
0.2
10
0 0.0
0 10 20 30 40 50 –20 –15 –10 –5 0 5 10 15 20
time (× N) shift (× N)
(a) (b)
×104 ×104
4.5 4.5
4.0 4.0
state (n + N/2)
state (n + 1)
3.5 3.5
3.0 3.0
2.5 2.5
2.0 2.0
2.0 2.5 3.0 3.5 4.0 4.5 2.0 2.5 3.0 3.5 4.0 4.5
state (n) ×104 state (n) ×104
(c) (d)
×10–4
1.2 0.12
μ = 32660
1.0 σ = 3386 0.10
L = 106
0.8 0.08
PDF
PDF
0.6 0.06
0.4 0.04
0.2 0.02
0.0 0.00
2.0 2.5 3.0 3.5 4.0 4.5 0 1 2 3 4 5 6 7
state values ×104 state, least significant 3 bits
(e) (f)
Figure 11.4 Dynamical behavior of the DFP for parameters (k, l, m, N) = (3, 4, 4, 1024). a) Timetrace of
the state variable s of Eq. (11.3) at startup. Time is in units of the delay line length N. b) Autocorrelation
of the state. c) Return map sn → sn+1 . d) Return map sn → sn+N∕2 . e) Histogram of the state and fit to a
normal distribution from one million samples. f ) Histogram of the values obtained from one million
samples of the three least significant bits of the state. The dotted line indicates P = 1∕8, the bin value
for a theoretical uniform distribution.
214 IoT Security: Advances in Authentication
delay systems, a suitable delay embedding reveals some structure reminiscent of the
nonlinearity employed [19, 20]. We have found this is not the case here, as for example
the half-delay return map sn → sn+N∕2 , shown in Figure 11.4d, reveals no recognizable
structure. A histogram of the state derived from L = 106 samples, Figure 11.4e, shows
a near-perfect fit to a normal distribution with location 𝜇̂ s = 32660 and root-variance
𝜎̂ s = 3386.
Table 11.1 Results from the NIST randomness test suite, for the testing of 50 million bits obtained as
the LSBs from the state variable of a DFP with parameters (k, l, m, N) = (3, 4, 4, 1024).
However, due to the highly irregular dynamical behavior of the DFP, a simpler method
to generate random bits works as well. Here, we take the least significant bit of each
sample of the state variable. In Table 11.1, we show the results of the National Institute
of Standards test suite for random bit streams [21] on 50 million bits generated by this
method. The random bits were divided in 50 sequences of 1 million bits each. The test
suite was used with the default settings. Where a test has more than one result, both
the highest and lowest results are shown. The results file states that the minimum pass
rate for each statistical test, with the exception of the random excursion (variant) test, is
approximately 47 for a sample size of 50 binary sequences. The minimum pass rate for
the random excursion (variant) test is approximately 31 for a sample size of 34 binary
sequences. We conclude that the bitstream thus generated by the LSB of the DFP state
variable shows no sign of deviation from randomness.
state 1 ×10–2
60
state 2
state1,2 crosscorrelation
1.0
50
states (× 103)
40 0.5
30 0.0
20
–0.5
10
–1.0
0
0 2 4 6 8 10 12 –20 –10 0 10 20
time (× N) shift (× N)
(a) (b)
0 system 1
power spectra (dB rel. max)
2.5
system 2
–10
normalized distance
2.0
–20
–30 1.5
–40 1.0
–50 0.5
–60 0.0
0.0 0.1 0.2 0.3 0.4 0.5 0 10 20 30 40 50
frequency (rel. 1/N) time (× N)
(c) (d)
Figure 11.5 Two DFPs differing in a single swap in the permutation table, but otherwise identical.
a) Transient at start up. b) Crosscorrelation. c) Power spectrum. d) Normalized distance of entries in the
delay line.
The only difference beween them consists of two values that are swapped in the per-
mutation table of one DFP. After an initial transient, the timeseries diverge completely.
Their maximal crosscorrelation, shown in Figure 11.5b is 0.013, revealing no relation
between the signals or the nearly identical systems they originated from. The power
spectra, shown in Figure 11.5c, appear similar in nature. In Figure 11.5d, we show the
normalized Euclidian distance of the N-component vectors X1 , X2 formed by the delay
line entries. This distance is calculated as:
∑
N
(x2,i − x2 − x1,i + x1 )2
i=1 Var{X1 − X2}
d(X1 , X2 ) = √ ≈√ , (11.11)
∑
N
∑
N Var{X1}Var{X2}
(x1,i − x1 ) 2 (x2,i − x2 )2
i=1 1
where x1 and x2 represent the mean values. This illustrates that, after the transients the
system states stay separated. In Figure 11.5d, the mean value of d(X1 , X2 ) ≈ 2 coincides
with what is expected for two independent identically distributed normal random vari-
ables. From 1 million bits derived from the LSBs of both DFPs, we found that the fraction
Hardware-Based Encryption via Generalized Synchronization of Complex Networks 217
of equal bits was 0.500423. This is in line with what can be expected for two unrelated
random bit generators. In addition, we found that negating even one single bit in the per-
mutation table gave similar results. This suggests that every possible permutation table
yields a completely different generator, which understandibly is a prominent feature of
the DFP as a driving oscillator in an encryption system.
15 15
k+8 k+8
k–1 k–1
Bit shifter
0 ≫l 0
7 3.5 7
6 6 4
3.0
norm. dist. states
5 2.5 5
3
4 4
2.0
3 3 2
1.5
2 2
1.0
1 1 1
0.5
0 0
0.0 0
0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0
time (samples) ×103 time (samples) ×103
(a) (b)
Figure 11.7 a) Synchronization of two identical followers, each having eight PF blocks, starting from a
random state. b) Two almost identical followers, differing in a single permutation table swap in the
fourth PF do not synchronize. The color-intensity plot depicts the normalized Euclidian distance, over
64 samples (Eq. (11.11)).
after the other, the PF blocks synchronize until both followers are entirely in sync. In
contrast, if two values are swapped in one of the permutation tables, for example, in the
fourth PF, then from this onward, the followers do not synchronize. This is shown in
Figure 11.7b. Experimentally, we observed that the crosscorrelation between the out-
puts of the desynchronized followers stayed below 1.2%, which is qualitatively similar
to Figure 11.5b. Note that instead of using a single 8-bit permutation table per PF block,
two 4-bit permutation tables which together form a single 8-bit table are used. The rea-
son for this is as follows. We want to maximize the effect of a difference in permutation
table entries between two followers. On average, a single entry in a 8-bit permutation
table in a PF would get a “hit” once every 28 = 256 samples. Suppose we find ourselves
Hardware-Based Encryption via Generalized Synchronization of Complex Networks 219
in the situation where all PF blocks between two followers, except for the last one, are
identical and this last PF would have only one bit error or one swap. Then by virtue
of the feedforward nature of the PF many of its output samples would be correct. This
might lead to parts of the message that are in between hits of the wrong value to be
decoded correctly. Since for the 4-bit permutation table the hit rate is 1∕16-th, there is
less time for this to happen. Alternatively, one can say that the overal 8-bit permutation
formed by the 2× 4-bit tables changes in 16 places for every single change in a 4-bit
table. Understandibly, we pictured an extreme case, and using 8-bit permutation tables
in all PF blocks of a follower will offer adequate security. A mixed approach, where inter-
nal the PF blocks benefit from an 8-bit permutation table, while the last block utilizes
two 4-bit tables is also possible. The downside of this approach is that there simply exist
fewer 4-bit permutation tables then 8-bit ones.
Table 11.2 Results from the NIST randomness test suite, for the testing of 50 million bits obtained as
the LSBs from the output of a chain of PF blocks, having parameters (k, l, m, M) = (3, 4, 4, 8).
driver DFP 1
predriver
DFP 2
driver
key
PF 2 PF 2 PF 2
PF 8 PF 8 PF 8
bit
extraction &1 &1 &1
Figure 11.8 Image encryption using the proposed scheme based on generalized synchronization
between two chains of permute-filter blocks, driven by delay-filter-permute blocks.
driver DFP 1
predriver
DFP 2
driver
key (challenge)
follower 1 PF 1 PF 1 follower 2
PF 2 PF 2
PF 8 PF 8
bit
extraction &1 &1
response data +
verify
identity
Figure 11.9 Authenticated transmission: the veracity of the origin of the response is guarantueed by
having the data signed with the responder’s identity. Upon decoding the response, the initiator checks
the identity agains known-good responders.
it is possible to generate bitstreams from other than the LSB of the final PF block in a
follower chain, perhaps even from intermediate PF states. Obviously, there are many
possible topologies to examine. Nevertheless, we have shown that the scheme that was
introduced in [11] using analog electronics, can readily be ported to digital hardware.
We conclude by remarking that complex systems are increasingly seen as alternative
computational resources (for example in the field of Reservoir Computing [12], instead
of mere system-dynamical curiosities to be studied in isolation. We expect all future
technologies, not only IoT, to benefit from their application and have aimed show the
practical viability of one such scheme.
Acknowledgements
LK and GVDS were partly supported by the Belgian Science Policy Office under Grant
No IAP-7/35 “Photonics@be” and by the Science Foundation - Flanders (FWO). GVDS
thanks the Research Council of the VUB.
Additional Information
The authors declare no competing financial interests.
References
1 Vernam, G.S. (1926). Cipher Printing Telegraph Systems For Secret Wire and Radio
Telegraphic Communications. Journal of the IEEE 55: 109–115.
2 Pappu, R., Recht, B., Taylor, J. and N. Gershenfeld. (2002). Physical One-Way Func-
tions. Science 297 (5589): 2026–2030.
3 Gassend, B., Clarke, D., Van Dijk, M. and Devadas, S. (2002). Silicon physical
random functions. Proceedings of the 9th ACM conference on computer and com-
munications security, Washington, USA (18–22 November 2002). ACM.
4 Herder, C., Yu, M.D., Koushanfar, F. and Devadas, S. (2014). Physical unclonable
functions and applications: a tutorial. Proceedings of the IEEE 102 (8): 1126–1141.
5 Rűhrmair, U. and Holcomb, D.E. (2014). Pufs at a glance. Proceedings of the confer-
ence on Design, Automation and Test in Europe, European Design and Automation
Association, Dresden, Germany (24–28 March 2014). IEEE.
6 Rűhrmair, R., Sehnke, F., Sölter, et al. (2010). Modeling attacks on physical unclon-
able functions. Proceedings of the 17th ACM Conference on computer and communi-
cations security, Chicago, USA (04–08 October 2010). ACM.
224 IoT Security: Advances in Authentication
7 G. T. Becker, (2015). The gap between promise and reality: On the insecurity of xor
arbiter pufs. In: Cryptographic Hardware and Embedded Systems –CHES 2015 (eds.
T. Gűneysu, and H. Handschuh), 535–555. Berlin, Heidelberg: Springer.
8 Cuomo, K.M., Oppenheim, A.V. and Strogatz, S.H. (1993). Synchronization of
Lorenz based chaotic circuits with applications to communications. IEEE Trans-
actions on Circuits and Systems II: Analog and Digital Signal Processing 40 (10):
626–633.
9 Argyris, A., Syvridis, D., Larger, L. et al. (2005). Chaos-based communications at
high bit rates using commercial fiber-optic links. Nature 438: 343–346.
10 Porte, X., Soriano, M.C., Brunner, D. and Fischer, I. (2016). Bidirectional private
key exchange using delay-coupled semiconductor lasers. Optics Letters 41 (12):
2871–2874.
11 Keuninckx, L., Soriano, M.C., Fischer, I. et al. (2017). Encryption key distribution via
chaos synchronization. Scientific Reports 7: 43428.
12 Keuninckx, L., Danckaert, J. and der Sande, G.V. (2017). Real-time Audio Processing
with a Cascade of Discrete-Time Delay Line-Based Reservoir Computers. Cognitive
Computation 9 (11): 10.1007/s12559-017-9457-5.
13 Oliveira, H.M. and Luas, L.V. (2015). Huygens synchronization of two clocks. Scien-
tific Reports 5: 11548.
14 di Pellegrino, G., Fadiga, L., Fogassi, L. et al. (1992). Understanding motor events: a
neurophysiological study Experimental Brain Research 91: 176–180.
15 Strogatz, S.H. (2001). Nonlinear dynamics and chaos: With applications to physics,
biology, chemistry, and engineering. New York, NY: Perseus books.
16 Kato, H., Soriano, M.C., Pereda, E. et al. Limits to detection of generalized synchro-
nization in delay-coupled chaotic oscillators. Physical Review E 88 (6–1): 062924.
17 Soriano, M.C., Garcia-Ojalvo, J., Mirasso, C.R. and Fischer, I. (2013). Complex pho-
tonics: dynamics and applications of delay-coupled semiconductor lasers. Reviews of
Modern Physics 85: 421–470.
18 Ogorzalek, M.J. (1997). Chaos and Complexity in Nonlinear Electronic Circuits.
Singapore: World Scientific Publishing.
19 Mackey, M.C. and Glass, L. (1977). Oscillation and chaos in physiological control
systems. Science 197 (4300): 287–289.
20 Van der Sande, G., Soriano, M.C., Fischer, I. and Mirasso, C.R. (2008). Dynam-
ics, correlation scaling, and synchronization behavior in rings of delay-coupled
oscillators. Physical Review E 77 (5): 055202.
21 Bassham, L.E., Rukhin, A.L., Soto, J. et al. (2010). A statistical test suite for random
and pseudorandom number generators for cryptographic applications. Technical
Report, National Institute of Standards & Technology, Gaithersburg, MD, USA.
https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=906762 (accessed 25 June
2019).
225
Part V
12
12.1 Introduction
Recently, there has been considerable global interest in exploiting digital healthcare
solutions, often known as eHealth in order to improve traditional healthcare mecha-
nisms. Currently, fewer physicians are taking care of more patients than ever; doctors
do not have enough time to educate patients about their condition or care plans which
causes uncertainty, stress, non-adherence to care plans, and unnecessary hospitaliza-
tion. On the other hand, global healthcare spending is projected to reach $8.7 trillion by
2020 with an annual growth rate of 4.1% in 2017–2021. This growth is driven by a num-
ber of factors such as, chronic diseases (becoming more common), aging, increasing
population, expansion in developing markets, new though costlier medical treatments,
and rising labor costs [1, 2].
Certain chronic conditions, such as hypertension, excess weight and diabetes, are risk
factors for stroke. A stroke is a condition where the flow of blood carrying oxygen and
nutrients to a portion of the brain is reduced or blocked. Stroke is the second most
common cause of death worldwide and ranks third most Disability Adjusted Life Years
(DALY) [3].
As seen in Figure 12.1, in Finland with a population of 5.5 million, there are about
82 000 stroke patients and every year about 25 000 new people are impacted by stroke.
As many as 17% of patients suffer a new stroke within a year, 10–20% develop dementia
and one-third have aphasia (speech difficulties). About 50% of these patients have per-
manent damage of some sort while every fourth patient is of working age. Almost half
of these patients require active rehabilitation following a stroke which has a relatively
high impact on the economy. According to statistics, stroke is the third most expensive
chronic condition in Finland with the first year of treatment costing over €20 000, life-
time cost greater than €85 000 and approximately 1.8 M in patient days caused every
year. It is estimated that in Finland there will be a need for at least 100 new hospital
wards by 2020 because of the increased number of stroke patients [4].
Stroke can be a lethal or a severely disabling event. Stroke patients have multiple prob-
lems with memory, normal movement, speech, and the fear of recurring strokes. One
typical reason for stroke is occasional malfunction of the heart (typically in the left atrial
part of the heart) that causes clotting. This clot exits the heart after physical exercise, for
example, when the heart pumps heavily and ends up blocking narrow blood vessels in
20%
82000 18500 3rd 15%
Permanent Lifetime care Healthcare Most
impediment costs expenditure expensive
disease
the brain causing the stroke. The medical challenge is that most of these atrial fibrillation
cases causing the clotting are not traceable after the event and some are not even noticed
by the patient. There is, nevertheless, high risk of recurrent strokes in cases where blood
flow through the heart is not functioning correctly. This creates a high interest to mon-
itor the heart of stroke patients until normal heart functionality or dysfunctionality can
be verified. Once validated, the monitoring of the impact of medication and/or func-
tionality of a pacemaker becomes important.
There are two methods to prevent stroke: primary and secondary. Primary prevention
is used for those who have not suffered from stroke previously, whereas secondary pre-
vention applies to the patients who have already been affected by stroke. Although there
are challenges such as poor adherence to medication, failed care plan and cryptogenic
causes, still approximately 80% of reccurrences could be prevented with early and fast
diagnosis [5].
To overcome some of the secondary prevention challenges and to expand geograph-
ical responsibility areas of healthcare providers, in this chapter, a secure digital remote
patient monitoring solution is introduced. With this solution, a patient could be mon-
itored and served remotely; health services could be provided to people far away from
hospitals and by experts not necessarily available in the nearest hospital. In addition,
the proposed solution applies the concept of eHealth to increase information sharing
about the disease and patient awareness regarding their risk factors to improve self-care.
This solution extends ElectroCardioGram (ECG) monitoring from a typical 24–48 hour
holtering case to multiple 48 hour sessions across a post-discharge care plan of several
months [5].
The rest of the chapter is organized as follows. Section 12.2 describes the remote
patient monitoring platform in general. Section 12.3 discusses the security concerns
related to digital health technologies and briefly reviews available safeguard and authen-
tication techniques to secure a digital health system. Section 12.4 introduces a security
architecture for the proposed remote patient monitoring platform and finally, and con-
clusions are presented in the last section.
Bluetooth
Data Analytics & Data
ingestion Security visualization
Monitoring devices
orchestrated to other digital services or network modules via Network Functions Virtu-
alization (NFV). In the current use case, Docker and Amazon Application Programming
Interfaces (APIs) are used for orchestration.
The remote patient monitoring platform consists of patient monitoring devices, a
patient smartphone application, a cloud backend (docker containers in multiple VMs,
orchestrated with Docker Swarm) and a web-based clinician application. The cloud
backend could also utilize NFV for security and anomaly detection purposes.
As shown in Figure 12.2, the platform includes three main parts: patient, cloud, and
hospital side.
At the patient side, wearables are provided to patients to measure parameters such as
Blood Pressure (BP), weight, and ECG. The information is collected periodically, based
on a care plan. Collected information is transferred via Bluetooth to a mobile device that
has the Patient App. Then, information from the Patient App will be transferred to the
cloud. In the cloud, there are different modules, for example, database (DB), data ana-
lytics and security and data visualization. The cloud has also an interface to electronic
health records (EHRs) databases for storing patient data. The Data Analytics and Secu-
rity module will classify data in predefined clusters either for anomaly detection or for
future investigation by doctors. The data visualization module will transform classified
data to be visualized by doctors. The doctors can log in and view the patient informa-
tion through the Clinician App [5]. The Patient App and Clinician App are shown in
Figure 12.3.
Adherence
>80%
Figure 12.3 Patient App and Clinician App of remote patient monitoring platform.
or remote control of a wearable medical device, then an attacker could potentially harm
or kill the person e.g. by causing a pacemaker to malfunction or an insulin pump to
overdose or under-dose the insulin supplied to the person [6].
Users may prove their identity to a device using a password, Personal Identification
Number (PIN) or fingerprints. Wearable devices like watches might serve as proxy
devices with more natural interactions than a smartphone. As each user will perform a
gesture differently, gestures can also serve as a form of authentication and therefore be
used to identify a person. Furthermore, the proximity of a wearable device is helpful in
identifying several contextual factors, including user location and people nearby [7].
In order to perform safe and secure data exchange between patients and their health-
care providers, different security aspects must be considered in a digital health platform:
• Technical safeguards such as encryption, authentication, and intrusion-detection
methods.
• Physical safeguards such as security enclosures for workstations, media disposal pro-
cedures and asset tracking.
• Administrative safeguards such as risk analysis, access rights reviews and security
training.
This chapter only concentrates on the technical safeguards. The current section sur-
veys available authentication and cryptography methods, and the next section describes
security measures in general. In addition, the next section also proposes an anomaly
detection module to efficiently detect and prevent intrusion on the proposed platform.
IoT Use Cases and Implementations: Healthcare 231
period or not. In addition, the IoT gateway verifies the Message-Digest 5 (MD5) value
for integrity purposes. If all parameters are correct, then the IoT gateway sends an
acknowledgement message to the IoT device [14].
In [15], a lightweight authentication scheme for eHealth application has been
proposed that authenticates each object and establishes a secure channel between
IoT devices and IoT gateway. HMAC ensures the integrity of communications. The
proposed scheme has three phases: registration, authentication, and key establishment.
Initially, a device is registered in the registration phase. In the authentication phase,
mutual authentication is performed between an IoT device and IoT gateway. The IoT
device generates a random value and sends a message to the IoT gateway consisting of
generated value, masked identity and HMAC code. Upon receiving the message, the
IoT gateway verifies the content with an associated HMAC. If verification is successful,
then the IoT gateway generates a random value, and sends the message consisting
of received value, generated random value and HMAC code to the IoT device. Upon
receiving the message, an IoT device verifies its integrity with a supplied HMAC
code; and if verification is successful then mutual authentication is carried out. After
successful mutual authentication, a shared symmetric key is established for securing
the communication channel. At the end, an encrypted message with a session key is
sent to the IoT gateway to indicate the termination of key establishment process.
To improve the standard of life for elderly people, recently Ambient Assisted Living
(AAL) systems are deployed as IoT applications. In order to protect sensitive health data
generated by AAL and to establish a secure communication between medical devices
and remote hosts, a proxy-based authentication with key establishment protocol has
been proposed in [16]. In the proposed proxy-based approach, the resource constrained
IoT medical devices, delegates the costly computational cryptographic operations to
computationally rich devices located in the neighborhood of the medical sensor. The
IoT sensor sends a request message (that contains identity of the source) to the respon-
der. Upon receiving the request, the nearby computationally rich device (responder)
checks the source (IoT device) of the message. If all preceding checks are successful, the
key establishment session will be initiated, and data will be exchanged securely via the
proxy over the TLS or IPSec (Internet Protocol Security).
To provide a secure authentication mechanism between the server and the IoT device,
in [17], a multi-key (multi-password) based mutual authentication method has been
proposed, as single password-based authentication mechanisms are vulnerable against
side-channels and dictionary attacks. In this mechanism, the key is changed after every
successful session between the server and the IoT device. The secure vault, which is
a secret between the server and IoT device, is a collection of equal-sized keys. In this
study, a three-way mutual authentication scheme is used; an IoT device sends a con-
nection request to IoT gateway. Upon receiving the request, the IoT gateway sends a
challenge to an IoT device; Upon receiving the challenge, the IoT device responds to the
challenge from the IoT gateway and sends back an authentication challenge. If the IoT
gateway verifies that the reply from the IoT device is valid, the IoT gateway responds
to the challenge from the IoT device. This completes the three-way mutual authentica-
tion phase, and a session key will be produced to encrypt the exchanged communication
between the IoT device and IoT gateway. Upon termination of a session, the session key
will expire and later will be regenerated based on a three-way mutual authentication
handshake process.
234 IoT Security: Advances in Authentication
And finally, OAuth2 is a token-based authentication; where the user logs into a system
and the system requests authentication in the form of a token. The user forwards the
request from system to the authentication server, where the request is either rejected or
accepted. If the request is allowed, the authentication server provides the token to the
user and then to the requester [18].
Standard
Bluetooth (LE) AWSFull OAuth2 authentication
encryption Disk (EBS) for REST APIs
TLS with client (exchange two-factor
encryption
certificate credentials for Access
Sensor data Access Secure Token)
(ECG,HR,HRV,BP,…) Control detailed
access logs
Sensors Receive Data Upload Data Acquisition
Processing Pipeline
Local Analysis Upload
Buffer
Patient Patient Diary Patient Web App Clinician
Analytics
User Data REST APIs
Interface Device
Config Device Config
Configuration Mgmt Device Device Hospital
Nurse User Interface HTTPS
Mgmt Configs Integration Clinician App
User (TLS1.2+ )
Interface All comms
PatientApp Gateway background VPN? TLS
with in cloud
Hospital
The authentication server will also verify two-factor authentication. If TLS client cer-
tificates are used as two-factor authentication, this means verifying that the clinician
TLS client certificate matches the clinician username (for username and password cre-
dential) or the device from where an access token was originally requested (for access
token credential). For mobile applications, the authentication server will map TLS client
certificates to patient IDs.
Linear Algorithm I
Feature Extraction
Protocol Analyzer
DoS Attack
Yes UDP
TCP Learning Algorithm II
Traffic
B
Linear Algorithm II
No
Feature Extraction
M
Feature Extraction
Attack
Rule Extractor &
Deduplicator .
.
.
Traffic Dropped
Attack (DA) N–1
N
Counter &
Prioritization
Sampled
Feature Extraction
Traffic
DA
Log file
Attack
FN
Traffic+Attack
Validator
FP
Traffic
FN
Learning Algorithm I Database
Some protocols such as HTTP and TCP are well-known vulnerable protocols while
others like Real Time Streaming Protocol (RTSP) could be a safe protocol. RTSP
checks whether traffic is carried on any of the listed vulnerable protocol.
ii. Counter and Prioritization module
The function of this module is based on the occurrence threshold (n) and prioriti-
zation. It means that if the vulnerable protocol carries suspected traffic for n times,
then this module will forward the suspicious traffic to the next layer for detection
and labeling. The idea is to cycle all possible vulnerable protocols over an agreed time
238 IoT Security: Advances in Authentication
Counter &
Prioritization
Yes
Suspicious Traffic
Safe Traffic
Vulnerable No Feature
Protocol? Extraction
Traffic
Log file
Learning
Algorithm I
window (one hour, one day, etc.). The module only keeps a certain number of vulner-
able protocols in the list which is based on prioritization. For example, if we already
have 20 vulnerable protocols and a 21st comes up, then the counter must prioritize
only 20 of these protocols. The prioritization is based on the counting occurrence
over the time window. The sole purpose of this technique is to reduce the computa-
tion load of traffic analysis.
iii. Feature Extraction
This extracts the best features from the suspicious protocol. This module is utilized
in second phase as well.
iv. Learning Algorithm I
If the protocol (that carries the input traffic) is not listed as vulnerable, traffic is still
sent to this learning algorithm for analysis and reconfirmation. The learning algo-
rithm I will check whether the protocol is vulnerable or not. Our proposed platform
is tested with Extreme Learning Machines (ELM), Self-Organizing Map (SOM) and
MultiLayer Perceptron (MLP) algorithms.
v. Log file
Every time the learning algorithm I in the protocol analyzer detects a new vulnerable
protocol, it is recorded into the log file and feedback will be sent to the decision
module via a database. The log file records packet features such as time stamp, packet
size, Internet Protocol (IP) header and information on other layers (Ethernet, TCP,
application layer).
Input from
Phase 1
Feature Malicious Traffic
TCP Extraction Safe Traffic
Linear
Linear Rule Extractor Learning
Algorithm
AlgorithmII & Deduplicator Algorithm II
i. Linear Algorithm I
This module analyzes User Datagram Protocol (UDP) traffic to detect UDP DoS
attacks. Therefore, a separate algorithm such as a Decision Tree (DT) is consid-
ered for this module in order to avoid overloading the rest of the proposed hybrid
model. However, the decision-tree algorithm can be replaced based on the operator
demand, we have considered it because of its low processing time.
ii. Rule Extractor and Deduplicator
This module filters the known attacks that the system is already protected against,
by using other deployed security mechanisms and forwards other attacks to learning
algorithm II for labeling. A set of rules are extracted from those deployed security
mechanisms in the network, the extracted information is compared with received
attacks from linear algorithm I and is dropped if it is similar. Rules in this module
are updated dynamically, based on input from the parallel security mechanisms.
iii. Learning Algorithm II
This module is the last detection layer. Initial features and clusters are defined for
the algorithm during the training process in order to cluster different attacks such as
Botnet attack (B) and Malicious codes (M). At first, the traffic is labeled to one of the
clusters based on their similarity or distance. As the traffic that arrives to this module
has been already identified as an attack, if it does not belong to any of the mentioned
clusters then it is considered as new type of attack (N) and a cluster will be created
for it. The features of the new type of attack (N) must be added to the algorithm
accordingly. The implementation of the proposed platform with Artificial Neural
Networks (ANNs) and Genetic Algorithm (GA) is already ongoing by authors and
results will be presented in a future paper. Other potential unsupervised algorithms
can be SOM and hierarchical clustering.
Validator
Input from Updates to Phase 1
Phase 1 or 2 and Phase 2 : FP, FN
Database
The validator acts similarly to the error detection module in order to decrease False
Positive (FP) and False Negative (FN) rates. If the actual result differs from the expected
result, then the result is considered as error and is not registered in the database (DB).
Validator should be always updated with labeled data and output from detection algo-
rithms. The database saves all the results of detection algorithms; from each algorithm,
a sample of the outcome (feedback) is sent to the database that will be used in future
detection. A database contains known attacks, new attacks and dropped attacks.
Login request • Clinician • Password matches the Perimeter server verifies • Audit logging OAuth2 access
from browser username/password hash in user database request is originating from • Session timeout if token (one day
• Personal TLS client • Two-factor hospital network or has access token is validity period)
certificate ID from authentication valid TLS client certificate invalidated
perimeter server credentials (TLS client • Access token is
• Two-factor certificate ID) match bound to client
authentication the username certificate (TLS
credential client certificate
ID is used)
Web page None (static web pages do None Perimeter server verifies • Audit logging None
request from not contain confidential request is originating from
browser material) hospital network or has
valid TLS client certificate
REST API • OAuth2 access token • Token validity based Perimeter server verifies • Audit logging Internal token to
request from • Personal TLS client on digital signature or request is originating from • Session timeout specify the
browser certificate ID from database lookup hospital network or has access rights
perimeter server (if • Session timeout valid TLS client certificate according to
client certificates are • TLS client cert ID request and
used) from perimeter server security policy
must match the bound
token
Data upload • TLS client certificate ID • TLS client certificate is • Perimeter server verifies • Audit logging Internal token
request from from perimeter server mapped to patient ID client certificate corresponding
patient app • Patient-specific digital • TLS client certificate authenticity to the patient
signature for data corresponds the • Patient ID in the data user ID or
generated internal matches the patient ID patient ID
token returned by Auth Server
• Patient ID matches the
signature of the data
Authorization • Internal token • Check token is valid TLS client certificate is • Audit logging User or patient
request from • Description of the • Grant the requested valid details for the
a requested capabilities capabilities token if
microservice • TLS client certificate for requesting
the requesting microservice is
microservice entitled to them
242 IoT Security: Advances in Authentication
12.5 Conclusion
Replacing traditional health systems with digital health has gained global attention due
to the numerous advantages for both patients and healthcare providers. Digital health
reduces healthcare costs because there are fewer hospital visits for patients and home
visits by nurses. It also provides patients with easy access to physicians and health cen-
ters; remote monitoring involves patients in their care plan, treatment, and self-testing
via medical devices provided to them; they are more informed about their disease risk
factors, their treatment progress and care plan. Remote patient monitoring also helps
physicians to improve the diagnosis via continuous monitoring and for critical diseases
such as stroke that require immediate detection.
In this chapter, we briefly reviewed the challenges that patient and care providers
have for chronic disease in a traditional healthcare system. To overcome some of the
aforementioned challenges, we introduced a remote patient monitoring platform that
consists of three main parts: patient monitoring devices, cloud backend and hospitals’
clinician application. The system has been implemented as a pilot project and in joint
research with neurological and cardiology departments of Helsinki University Hospital
(HUS). The pilot was conducted in the Uusimaa region of Finland with approximately
30 patients monitored at the same time. The duration of the pilot was three months but
from an individual patient point of view it could also be shorter (approx. one week min-
imum, but typically might be from two weeks up to one month). The technical target of
the pilot was to provide remote vital signs monitoring and patient engagement for those
in post-acute stroke phase and with minimal setup or intervention required from med-
ical personnel. This efficient and continued monitoring led to medication adjustments
in 40% of the patients.
The outcome of the pilot project is summarized in Figure 12.10.
And finally, we introduced some techniques to protect the proposed platform against
attacks. While the majority of related studies discuss sole methods for eHealth security,
our proposed digital health platform not only introduces a novel intelligent architecture
to guarantee the platform and patient data security against the intrusions, but it also
applies a combination of different authentication methods to protect the system from
unauthorized access. The HADM applies several machine learning algorithms together
with a traffic-filtering mechanism to detect anomalies on control planes such as DoS or
an attack on administrative interfaces; also, to detect attacks on the user plane such as
corrupting patient data (ECG and BP) and stealing patient data, etc.
References
1 Global health care sector outlook. (2017). Deloitte. https://www2.deloitte.com/
content/dam/Deloitte/global/Documents/Life-Sciences-Health-Care/gx-lshc-2017-
health-care-outlook-infographic.pdf (accessed 16 July 2019).
2 Global health care outlook. (2018). Deloitte. https://www2.deloitte.com/content/dam/
Deloitte/global/Documents/Life-Sciences-Health-Care/gx-lshc-hc-outlook-2018.pdf
(accessed 16 July 2019).
3 Hankey, G.J. (2013). The global and regional burden of stroke. The Lancet Global
Health 1 (5): 239–240.
4 AVH in Figures. (2013). Association of brain diseases in Finland. https://www
.aivoliitto.fi/files/1091/avh_lukuina2013_web.pdf (accessed 16 July 2019).
5 Ijäs, P. and Honkanen, M. (2017). Teknologia tehokkaaseen käyttöön: Stroke remote
care -projekti HUS:n neurologisella osastolla, Aivosairaudet-symposium.https://www
.slideshare.net/MauriHonkanen/teknologia-tehokkaaseen-kyttn-stroke-remote-care-
projekti-husn-neurologisella-osastolla (accessed 16 July 2019).
IoT Use Cases and Implementations: Healthcare 245
6 Saleem, K., Tan, Z., and Buchanan, W. (2017). Security for cyber-physical systems
in healthcare. In: Health 4.0: How Virtualization and Big Data Are Revolutionizing
Healthcare (eds. C. Thuemmler and C. Bai), 233–251. Springer.
7 He, W., Golla, M., Padhi, R. et al. (2018). Rethinking access control and authenti-
cation for the home internet of things (IoT). In: 27th USENIX Security Symposium.
Baltimore, USA (15–17 August 2018): USENIX.
8 Chahid, I. and Marzouk, A. (2017). A secure IoT data integration in cloud storage
systems using ABAC control policy. International Journal of Advanced Engineering
Research and Science 4 (8): 34–37.
9 Maksimović, M. and Vujović, V. (2017). Internet of things based E-health sys-
tems: ideas, expectations and concerns. In: Handbook of Large-Scale Distributed
Computing in Smart Healthcare (eds. S.U. Khan, A.Y. Zomaya and A.M. Abbas),
241–280. Springer.
10 Miller, L. (2016). Choosing the right IoT solutions. In: IoT Security for Dummies,
INSIDE Secure Edition (ed. L. Miller), 27–37. Wiley.
11 Neto, A.L.M., Souza, A.L.F., Cunha, I. et al. (2016). AoT: authentication and access
control for the entire IoT device life-cycle. In: Proceedings of the 14th ACM Con-
ference on Embedded Network Sensor Systems (SenSys). Stanford, USA (14–16
November 2016): ACM.
12 Manzoor, A. (2016). Securing device connectivity in the industrial internet of things
(IoT). In: Connectivity Frameworks for Smart Devices the Internet of Things from a
Distributed Computing Perspective (ed. M. Zaigham), 3–22. Springer.
13 Dabbagh, Y.S. and Saad, W. (2018). Authentication of Everything in the Internet
of Things: Learning and Environmental Effects. http://arxiv.org/abs/1805.00969
(accessed 17 July 2019).
14 Chuang, Y., Lo, N., Yang, C., and Tang, S. (2018). A lightweight continuous authenti-
cation protocol for the internet of things. Sensors 18 (4): 1104.
15 Khemissa, H. and Tandjaoui, D. (2015). A lightweight authentication scheme for
E-health applications in the context of internet of things. In: 9th International
Conference on Next Generation Mobile Applications, Services and Technologies,
Cambridge, UK (9–11 September 2015). Cambridge, UK: IEEE.
16 Porambage, P., Braeken, A., Gurtov, A. et al. (2015). Secure end-to-end communica-
tion for constrained devices in IoT-enabled ambient assisted living systems. In: IEEE
2nd World Forum on Internet of Things (WF-IoT), Milan, Italy (14–16 December).
Milan, Italy: IEEE.
17 Shah, T. and Venkatesan, S. (2018). Authentication of IoT device and IoT server
using secure vaults. In: 17th IEEE International Conference on Trust, Security and
Privacy in Computing and Communications/12th IEEE International Conference on
Big Data Science and Engineering (TrustCom/BigDataSE), New York, USA (1–3
August 2018). New York, NY: IEEE.
18 OAuth, 3 Common Methods of API Authentication Explained. Nordic APIs. https://
nordicapis.com/3-common-methods-api-authentication-explained (accessed 17 July
2019).
19 Monshizadeh, M., Khatri, V., Atli, B., and Kantola, R. (2018). An intelligent defense
and filtration platform for network traffic. In: IFIP 16th International Conference on
Wired/Wireless Internet Communications (WWIC), Boston, USA (18–20 June 2018).
Boston: Springer.
247
13
Abstract
In a connected smart grid, several kinds of sensors have been integrated in smart meters to
measure energy usage and execute the control commands and/or instructions from the util-
ity companies. This becomes possible through the digital processing and communications
organized in the smart grid (SG) networks. As, a smart grid enables the two-way commu-
nication between the electricity supplier and users, an efficient security solution should be
integrated in the SG in order to guarantee the user’s privacy and authenticity of the data.
This chapter proposes a secure and efficient privacy preserving scheme based on elliptic
curve cryptography, outperforming both in computation and communication the best cur-
rently available schemes in literature. The proposed scheme is resistant against internal
attackers, provides authentication, integrity and confidentiality. In addition, it offers the
possibility of pinpointing the smart meter that is providing false input. The security features
of confidentiality and unforgeability are formally proven.
13.1 Introduction
The traditional power plants were concentrated systems where the energy flow was
unidirectional bulk generation to domestic or industrial consumers via the traditional
transmission and distribution lines. The new idea of connected smart grids is a
paradigm for distributed power generation and consumption which requires a complex
two-way communication infrastructure, sustaining power flows between intelligent
components. SG will provide various notable features, e.g., reduce pollution, efficient
use of energy [1, 2]. However, the initial steps of building a connected SG network
are already in progress – many countries have started rolling out smart meters to the
consumer premises. These smart meters are digital in nature and are able to collect
the fine-grained consumption data within the premises. It is anticipated that the smart
meter measurement data will be aggregated at regular intervals such as 15/30/45
minutes, as shown in Figure 13.1. The consumption data is then further utilized for
many different purposes, for instance, better control and management, demand and
response, billing, etc.
Figure 13.1 The periodic communication between smart meter and aggregator in smart grid network.
The SG network improves the efficiency, reliability, and sustainability of the traditional
power-grid. However, it raises many issues [3]: (i) privacy for the individuals as the smart
meter has to send consumption usages (or to be aggregated), periodically, to the power
providers. It has been demonstrated that power consumption profiles at a granularity of
15/30/45 minutes may disclose whether a property is empty. Moreover, such close profil-
ing on consumption usages may reveal the daily routines of the individuals, e.g., sleeping
patterns, individual behavior patterns, appliances and multimedia used. Consequently,
the power consumption usages could be used for criminal purposes. (ii) The frequent
data (or consumption) aggregation issue is not only limited to the individual privacy
from the home network but it can also pose security threats at the grid side network.
For instance, in the SG network, the data aggregation typically relies on the digital (and
open) communications and technologies. By exploiting such technologies, an attacker
may counterfeit devices (e.g., unauthorised smart meters and relay nodes, e.g., puppet
node [4]), to control the smart metering infrastructure in a SG network. Consequently,
an attacker could lead to disruption in the smooth functioning of the energy generation,
transmission, and distribution. (iii) As the energy usage value is generated by the smart
meter, an energy cheater (i.e., thief ) may have multiple means for data tampering. A few
Secure and Efficient Privacy-preserving Scheme in Connected Smart Grid Networks 249
energy cheating methods, such as smart meter tampering, bypassing, and meter location
switching, could be utilized to tamper with the consumption usage from the source of
origin (i.e., smart meter). More precisely, the smart meter is only source for the data
aggregation in the SG network, whether the smart meter readings are accurate or tam-
pered, the utility company has no way to prove the authenticity and correctness of the
consumption usage that is provided by the smart meter [5]. Therefore, security and pri-
vacy are major issues that need to be addressed in the SG, in order to overcome internal
and external attacks and guarantee the user’s privacy (i.e., confidentiality), authenticity
of smart meter, and correctness of data (i.e., integrity, and detection of cheater).
operations has been proposed that requires less resources at the smart meter but leave
out the possibility of finding the potential cheater in case of an incorrect integrity
check. We will show in this paper how to develop another ECC-based scheme, which
is more performant and offers more security features at the same time.
Finally, many of the proposed schemes in the literature require the existence of a
secure channel between the smart meters on one hand and the trusted third party (TTP)
on the other hand during meter registration. As shown in Figure 13.2 (refer to the left
hand side), the registration phase of the schemes proposed in [18, 21, 22] require a
secure communication between the smart meter and the aggregator – the red lines in
the communication correspond with a secure channel while the green lines represent
communication over the open channel. However, this requirement is sometimes diffi-
cult to establish, especially for updating the security material (e.g., if an SM is in a remote
place, then the Internet connectivity is not always good).
Figure 13.2 The different architectures and communication flows are presented, the one of
[18, 21, 22] on the left and the one for the proposed scheme on the right.
Secure and Efficient Privacy-preserving Scheme in Connected Smart Grid Networks 251
13.2 Preliminaries
13.2.1 System Model
We adopted the system model from the literature, e.g., [18, 21, 22] and the main partic-
ipants are as follows:
• Trusted third party (TTP). This entity is considered to be a honest but curious entity.
This means that it will execute the required processes, but will try to abuse informa-
tion for own purposes. The main task of the TTP is the distribution of the blinding
factor to the aggregator.
• The aggregator (Agg). This party is responsible for the management of the smart
meters in a certain region. This includes, among others, the analysis of the power
quality, the real-time maintenance and the real-time pricing. Only the sum of the
meter’s data is required for proper management of the SG. The Agg is assumed to be
powerful and to possess sufficient tamper-proof storage for storing the secret shared
keys with the SMs. The Agg generates and publishes the system parameters for the
security scheme. It also publishes all the public information about the smart meters
under its responsibility. The Agg is also considered to be a honest but curious party.
• Smart meter (SM). The smart meter is a resource-constrained device, which will send,
at each fixed period, the real-time measurements of the electricity consumption (can
also involve gas and water measurements) to the Agg. The communication to the Agg
is through recent low power and long-range technology, like LoRA, Sigfox, etc. The
private key is only known by the SM. We assume that the key material is stored in a
tamper-resistant module of it.
Hi ∶ {0, 1}∗ → Fq∗ , (i = 1, … , 5). Also a symmetric key encryption algorithm EK (M) will
be utilized to perform encryption of M using the secret shared key K. The concatena-
tion of two messages M1 and M2 is denoted by M1 ||M2 . We further assume that the
EC parameters and the associated EC operations, together with the hash function are
implemented in each entity participating the scheme.
The value B is securely sent to the Agg through the secure channel.
The message (ci , Yi , 𝜇i , IDi ) is sent by SMi to the Agg. The Agg now collects n tuples
(ci , Yi , 𝜇i , IDi ) at time Tt from each registered SMi . First, the Agg computes for each
tuple d𝛼 Yi and temporarily adds this to the stored list of identity-related information of
the SMs, {IDi , certi , Pi , Si , Hi }. Next, the Agg performs the following two operations:
∑
n
∑
n
∑
n
ci + B − H5 (IDi ||certi ||Si ||𝜇i ||Tt ) = mi
i=1 i=1 i=1
∑
n
H4 (IDi ||certi ||Si ||Tt ||d𝛼 Yi )−1 𝜇i P𝛼
i=1
( n )
∑
n
∑
−t Hi == mi P𝛼 (13.3)
i=1 i=1
∑n
Only the last 32 bits of i=1 mi are taken into account, which corresponds to the actual
∑n
sum of the consumption data i=1 cmi . Note that the first equation in 13.3 holds due
to the construction of the blinding factor of the Agg (cf. Eq. 13.2). The first equation
contributes to the confidentiality and authentication feature, while the second equality
in Eq. 13.3 to the integrity feature.
Moreover, suppose that if there is an issue with the integrity check on the total sum
(second equality in Eq. 13.3), then the individual messages (ci , Yi , 𝜇i , IDi ) of each SMi
will be analysed in depth. For the Agg, it is sufficient to verify if mi is incorporated in a
correct way in the parameters ci , 𝜇i , by checking the following equality.
(ci − H5 (IDi ||certi ||Si ||𝜇i ||Tt ))P𝛼 − Hi
= H4 (IDi ||certi ||Si ||Tt ||d𝛼 Yi )−1 𝜇i P𝛼 − tHi
which can be simplified by
(ci − H5 (IDi ||certi ||Si ||𝜇i ||Tt ))P𝛼 + (t − 1)Hi
= H4 (IDi ||certi ||Si ||Tt ||d𝛼 Yi )−1 𝜇i P𝛼 (13.4)
If this is not the case, the tuple (ci , Yi , 𝜇i , IDi ) will be rejected.
13.4.1.1 Game 1
In this game, 𝒞 first produces the system parameters and sends them to 𝒜 . Next, 𝒜
selects a challenging identity ID∗i , chooses two messages m0 and m1 and sends them to
𝒞 . Then, 𝒞 picks a random value b ∈ {0, 1} to select one of the messages for which a
signcrypted message (ci , Yi , 𝜇i , ID∗i ) is generated and sent to 𝒜 . Finally, using the five
queries (except the Unsigncrypt with identity ID∗i ) defined above, 𝒜 guesses the value
of b in order to distinguish which message has been signcrypted.
Definition 1. A data aggregation scheme provides confidentiality (also called indistin-
guishability against adaptive chosen ciphertext attacks - IND-CCA) if an attacker is not
able to win Game 1 with a non-negligible advantage, i.e., to guess b′ as the correct value
of b. The advantage of 𝒜 is defined by
AdvIND−CCA
𝒜 = 2||Pr(b = b′ ) − 1||
13.4.1.2 Game 2
In this game, 𝒞 first produces the system parameters and sends them to 𝒜 . Next, 𝒜
selects a challenging identity ID∗i and outputs a ciphertext (ci , Yi , 𝜇i , ID∗i ) corresponding
with the challenging identity ID∗i , by using the five queries defined above (except the
CorruptSM with identity ID∗i ).
Definition 2. A data aggregation scheme provides unforgeability (also called existential
forgeability against adaptive chosen message attacks - EUFCMA) if no attacker is able
to win Game 2 with a non-negligible advantage, i.e. if 𝒜 is not able to make a valid
ciphertext without usage of the Signcrypt query.
Theorem 13.1 The proposed scheme is able to provide confidentiality if the ECDHP
is hard. Proof.
Proof: We will prove that if 𝒜 succeeds to win the game with non-negligible advantage
𝜖, then also 𝒞 will be able to solve the ECDHP with non-negligible advantage, which is
a contradiction against the hardness of the problem.
table LSM . The variable Yi used in the derivation of the ciphertext is set to Q by 𝒞 .
Then, 𝒞 randomly selects the parameters ci , 𝜇i and stores the corresponding values in
LH4 , LH5 . Finally, 𝒞 outputs (ci , Yi , 𝜇i , IDi ) to 𝒜 .
Now, 𝒜 can proceed with the previously defined queries, which are answered by 𝒞
as follows.
1) Hi (m). For each hash function Hi , a table Lhi with tuples (m, r) is stored by 𝒞 con-
taining the input m and output r of the hash function Hi (), (i = 1, ..., 5). If the tuple
does not exist in the current list, a new entry is generated. 𝒜 has access to the tables.
2) CreateSM(IDi ). If IDi is not yet in the table LSM , 𝒞 randomly selects di , bi and 𝛼1i =
H1 (certi ||IDi ). Next, it computes certi = (di P − P𝛼 )(𝛼1i )−1 ). It further computes Pi and
Si . The tuple (IDi , di , certi , Pi , bi , Si ) is added to the table LSM .
3) CorruptSM(IDi ). If LSM does not contain an entry corresponding with IDi , 𝒞 makes
a CreateSM(IDi ) query.
4) Signcrypt(IDi , mi ). For this query, 𝒞 first checks if there is an entry in LSM related to
IDi . If not, it first makes a CreateSM(IDi ) query. Using this info, 𝒞 outputs a cipher-
text ci , Yi , 𝜇i , IDi .
After applying these queries, 𝒜 decides on the value of b. If 𝒜 is able to win the
game with non-negligible advantage, then 𝒞 can also solve the ECDLP as it needs to
find the tuple (R, 𝜇i (mi + tbi )−1 ) from LH4 , resulting in R (last part) as the solution of the
considered problem.
If qH4 corresponds with the number of H4 queries, the probability that 𝒞 can solve the
ECDHP equals to q𝜖 . Consequently, this leads to a contradiction and we can conclude
H4
that the proposed scheme provides confidentiality.
Theorem 13.2 The proposed scheme is able to provide unforgeability if the ECDLP
is hard.
Proof: We proof with contradiction that if 𝒜 is able to win the game, then 𝒞 is able to
solve the ECDLP. Let Q = xP and the derivation of x be the instance of the ECDLP that
we will consider. First, 𝒞 randomly picks an integer 𝛼, computes P𝛼 and determines the
system parameters Ep(a,b) , P, H1 (.), .., H5 (.), T0 , I, PTTP . Then 𝒜 chooses the challenging
identity IDI and 𝒞 answers the queries of 𝒜 as follows:
1) Hi (m). For each hash function Hi , a table Lhi with tuples (m, r) is stored by 𝒞 con-
taining the input m and output r of the hash function Hi (), (i = 1, ..., 5). If the tuple
does not exist in the current list, a new entry is generated. 𝒜 has access to the tables.
2) CreateSM(IDi ). If IDi is not yet in the table LSM , we distinguish two situations. If
IDi = IDI , then Pi = Q and random values are taken for certi , bi , Si . The tuple (IDi , ⟂,
certi , Pi , bi , Si ) is added to the table LSM . In the situation IDi ≠ IDI , 𝒞 randomly
selects di , bi and 𝛼1i = H1 (certi ||IDi ). Next, it computes certi = (di P − P𝛼 )(𝛼1i )−1 ). It
further computes Pi and Si . The tuple (IDi , di , certi , Pi , bi , Si ) is added to the table
LSM .
3) CorruptSM(IDi ). If LSM does not contain an entry corresponding with IDi , 𝒞 makes
a CreateSM(IDi ) query.
4) Signcrypt(IDi , mi ). This query can only be made if IDi ≠ IDI . In such situation,
𝒞 first checks if there is an entry in LSM related to IDi . If not, it first makes a
CreateSM(IDi ) query. Using this info, 𝒞 outputs a ciphertext ci , Yi , 𝜇i , IDi .
258 IoT Security: Advances in Authentication
5) Unsigncrypt(ci , Yi , 𝜇i , IDi ). Here, 𝒞 checks the validity of the ciphertext and decrypts
it to get the message mi .
As a result of the game, 𝒜 outputs a ciphertext (ci , Yi , 𝜇i , IDi ). If 𝒜 is able to gener-
ate a valid ciphertext, then we show that 𝒞 will be able to solve the ECDLP. Using the
forking lemma of [29], 𝒞 is able to construct another valid ciphertext (c∗i , Yi , 𝜇i , IDi ) by
choosing a different Hash function H2 . Take into account that bi = H2 (ri )di This leads to
the following two equations:
ci P = mi P + H2 (ri )di P + H5 (IDi ||certi ||Si ||𝜇i ||Tt )P
c∗i P = mi P + H2 (ri )∗ di P + H5 (IDi ||certi ||Si ||𝜇i ||Tt )P
Subtracting both equations, leads to the following equality
(ci − c∗i )P = (H2 (ri ) − H2 (ri )∗ )di P
and thus (ci − c∗i )(H2 (ri ) − H2 (ri )∗ )−1 as the solution of the ECDLP challenge.
Denote the size of LH2 by qh2 . To compute the hardness of this challenge, the proba-
bility is equal to the probability that a different hash value can be chosen 1∕qh2 times
the probability 𝜖 that 𝒜 is able to win the game, resulting in q𝜖 . Consequently if 𝜖 is
h2
non-negligible, this ECDLP challenge too, which is a contradiction.
13.4.2.1 Confidentiality
In our scheme, the individual consumption data mi of the SMs cannot be revealed by any
attacker. This follows from the fact that given the message tuple (ci , Yi , 𝜇i ), an adversary
either needs to solve the ECDLP or needs to know both bi and Si . The first parameter is
uniquely shared with the TTP and the second parameter with the Agg and its security
is based on the ECDLP.
Even if one (or a group of ) SMs would collaborate, they will never find the value bi
due to construction of these parameters, as either the private key of the TTP or the
involved SM should be known. Moreover, also the secret key Si cannot be found as it
would require the knowledge of the private key of the Agg or the involved SM.
Also the Agg on its own is not able to derive the value mi as it would need to know
bi . Due to the ECQV construction of the private key of the SM, whose security is also
based on the ECDLP, the Agg is not able to derive the private key of the SM and thus
derive the blinding factor bi .
Finally, the TTP is not involved in the construction of the private key of the SM. Con-
sequently, the TTP is not able to derive the secret key Si shared with the Agg.
13.4.2.2 Authentication
In the proposed scheme, the authentication follows from the integration of the terms bi
and H5 (IDi ||certi || Si ||𝜇i ||Tt ) in the computation of ci . Only a valid user with knowledge
of the private key of the involved SMi is able to construct both parameters bi , Si , due to
Secure and Efficient Privacy-preserving Scheme in Connected Smart Grid Networks 259
the ECDLP. If wrong values for either bi or Si are used, the second equality of Eq. 13.3
does not hold anymore.
13.4.2.3 Integrity
The integrity of mi is assured by the second parameter 𝜇i . This follows from the associa-
∑n ∑n
tivity property of EC addition, i.e. i=1 mi P𝛼 = ( i=1 mi )P𝛼 .
In order to harm the message integrity in the proposed scheme, suppose an attacker
(outsider, one or group of legitimated SMs) wants to add/decrease a certain amount of
consumption m∗i to/from mi for a particular i ∈ {1, … , n}, thus changing ci into ci + m∗i ,
it will lead to
∑n
∑
n
∑
n
ci + B − H5 (IDi ||certi ||Si ||𝜇i ||Tt ) = mi + m∗i
i=1 i=1 i=1
∑n
Consequently if i=1 H4 (IDi ||certi ||Si ||Tt ||d𝛼 Yi )−1 𝜇i will be computed, it will not be
∑n ∑n
equal anymore to ( i=1 mi )P𝛼 + t i=1 Hi as there is an additional term m∗i P𝛼 left. Thus,
without being able to solve the ECDLP, it is impossible to alter the message during
transmission.
Proposed
Feature [18] [21] [22] Scheme
features avoid that a smart meter can deny any performed malicious actions. We also
need two other Hash functions H6 , H7 . This parameter can then be defined as
ei = di H6 (IDi ||certi ||ci ||Yi ||𝜇i ||Tt ) +
ci yi H7 (IDi ||certi ||𝜇i ||Tt )
Only public key or known values are required to perform the check:
ei P = H6 (IDi ||certi ||ci ||Yi ||𝜇i ||Tt )Pi
+ ci H7 (IDi ||certi ||𝜇i ||Tt )Yi
The output of the SM in the data aggregation phase equals to (ci , Yi , 𝜇i , IDi ). To con-
struct this message by the SM, 2 EC multiplication and 2 hash operations need to be
executed. The processing of this message by the Agg requires in the best case, meaning
that the integrity check of the aggregated sum is positive, n + 3 EC multiplications, n EC
additions and 2n hashes. However, if the integrity check is negative and the SM provid-
ing false input should be detected, 3 additional EC multiplications and 1 EC addition are
needed for each SM, resulting in a total of 4n + 3 EC multiplications 2n EC additions
and 2n hashes. This corresponds with the worst case scenario.
Note that for the other ECC based scheme [22], at the side of the SM a total of 2
EC multiplications and hashes is required, while the Agg needs to execute 3n + 2 EC
multiplications, 2n EC additions and 3n hashes.
Table 13.2 compares the performance at the side of SM and Agg of the proposed
scheme with the ones of [18, 21, 22]. As can be concluded, the schemes applying EC
operations (the proposed scheme and [22]) highly outperform the other schemes. This
follows from the fact that BGN encryption and bilinear pairing operations have a con-
siderable higher computational complexity. The complexity of the proposed and the
scheme proposed by [22] is similar at the side of the SM. However, at the side of the
Agg in the best case, there is an improvement of factor 3 compared to [22] for a large
number of SMs. Even in the worst case, where each individual message of the SM should
be checked, our scheme is still in similar range as [22].
This difference in communication cost for one individual message has a huge impact
in the total traffic volume gain (i.e., overhead) at the aggregator. For the sake of example
purposes, consider a virtual smart village, where each aggregator serves N number of
consumers (i.e., SM). Let each SM generate a message (i.e., power consumption report)
every 15 minutes and send to the Agg. The total volume of messages that requires to be
verified every 15 minutes by the Agg will be significantly high. If the packet size equals
to p then the communication overhead at Agg is N × p. Consequently, the proposed
scheme is able to decrease this overhead with 24%, 75% and 77%, compared to [21, 22],
and [18] respectively.
13.6 Conclusions
The new idea of connected smart grids is a paradigm for distributed power generation
and consumption which requires a complex two-way communication infrastructure,
sustaining power flows between intelligent components. However, this bi-directional
communication raises many security and privacy challenges This chapter presents the
secure and efficient privacy-preserving scheme that can be applied in a connected smart
grid context, offering the best results from a computation and communication point
of view.
Our proposed scheme also adds additional security features compared to the other
state of the art schemes from the literature, like the possibility to detect the malicious
SM contributing to the aggregated sum and the avoidance of a secure channel between
SM and TTP.
References
1 Statistical office of the European Union (2016). Shedding light on energy in the EU:
A guided tour of energy statistics, Technical Reports. http://ec.europa.eu/eurostat/
cache/infographs/energy/ (accessed 25 June 2019).
2 Act of Congress, Energy Independence and Security Act of 2007, Pub.L. 110–140.
https://www.gpo.gov/fdsys/pkg/PLAW-110publ140/html/PLAW-110publ140.htm
(accessed 25 June 2019).
3 Ferrag, M.A., Maglaras, L.A., Janicke, H. and Jiang, J. (2016). A survey on
privacy-preserving schemes for smart grid communications, ARxIV:1611.07722V1
1–32.
Secure and Efficient Privacy-preserving Scheme in Connected Smart Grid Networks 263
4 Yi, P., Zhu, T., Zhang, Q. et al. (2016). Puppet attack. Journal of Networking and
Computer Applications 59: 325–332.
5 Zhifeng, X., Xiao, Y. and Du, D.H.-C. (2013). Non-repudiation in neighborhood area
networks for smart grid. IEEE Communications Magazine 51 (1): 18–26.
6 Jawurek, M., Johns, M., and Kerschbaum, F. (2011). Plug-in privacy for smart meter-
ing billing. Proceedings in Privacy Enhancing Technologies: 11th International Sympo-
sium, PETS, Waterloo, Canada (27–29 July 2011). Springer.
7 Chim, T.W., Yiu, S., Hui, L.C.K. et al. (2012). Selling power back to the grid in a
secure and privacy-preserving manner. Proceedings Information and Communications
Security: –The International Conference on Information and Communication Systems,
Baghdad, Iraq (9–12 April 2012). IEEE.
8 Bohli, J.-M., Sorge, C. and Ugus, O. (2010). Privacy preserving via group signature
in smart grid. IEEE International Conference on Communications, 2010, Capetown,
South Africa (23–27 May 2010). IEEE.
9 Zargar, S.H.M. and Yaghmaee, M.H. (2013). Privacy preserving via group signature
in smart grid. Proceedings of the First Congress of Electronic Industry Automation,
Mashhad, Iran (13 February 2013).
10 Cheung, J.C.L., Chim, T.W., Yiu, S. et al. (2011). Credential-based privacy-preserving
power request scheme for smart grid network. Proceedings of the Global Communi-
cations Conference, GLOBECOM, Texas, USA (5–9 December 2011). IEEE.
11 Garcia, F.D. and Jacobs, B. (2010). Privacy-friendly energy-metering via homomor-
phic encryption. 6th International Workshop on Security and Trust Management:
STM, Athens, Greece (23–24 September 2010). Springer.
12 Li, F., Luo, B., and Liu, P. (2010). Secure information aggregation for smart grids 470
using homomorphic encryption. First IEEE International Conference on Smart Grid
Communications SmartGrid-Comm, Maryland, USA (4–6 October 2010). IEEE.
13 Ruj, S. and Nayak, A. (2013). A decentralized security framework for data aggre-
gation and access control in smart grids. IEEE Transactions on Smart Grid 4 (1):
196–205.
14 Li, H., Lin, X., Yang, H. et al. (2013). EPPDR: an efficient privacy-preserving demand
response scheme with adaptive key evolution in smart grid. IEEE Transactions on
Parallel and Distributed Systems 5 (8): 1–11.
15 Lu, R., Liang, X., Li, X. et al. (2012). EPPA: An efficient and privacy-preserving
aggregation scheme for secure smart grid communications. IEEE Transactions on
Parallel and Distributed Systems 23 (9): 1621–1631.
16 Shi, E., Chan, T.H.H. and Rieffel, E. (2011). Privacy-preserving aggregation of
time-series data. Proceedings of the Annual Network and Distributed System Security
Symposium –NDSS Symposium, San Diego, USA (6–9 February 2011). The Internet
Society.
17 Bae M., Kim, K. and Kim, H. (2016). Preserving privacy and efficiency in data com-
munication and aggregation for AMI. Journal of Network and Computer Applications
59: 333–334.
18 Fan, C.-I., Huang, S.-Y. and Lai, Y.-L. (2014). Privacy-enhanced data aggregation
scheme against internal attackers in smart grid. IEEE Transactions on Industrial
Informatics 10 (1): 666–675.
264 IoT Security: Advances in Authentication
14
Abstract
Cyber Physical Trust Systems (CPTS) are Cyber Physical Systems and Internet of Things
(IoT) enriched with trust as an explicit, measurable, testable system component. In this
chapter, we propose to use blockchain technology as the trust-enabling system component
for CPTS. Our proposed approach shows that a blockchain-based CPTS achieves the secu-
rity properties of data authenticity, identity, and integrity. We describe results of a testbed
which implements a blockchain-based CPTS for physical asset management.
Keywords cyber physical systems; internet of things; data authenticity; identity; integrity;
asset management
14.1 Introduction
Cyber Physical Systems ( CPS) integrate computation, networking, and physical pro-
cesses [1]. As CPS and Internet of Things (IoT) are overlap quite a bit, the distinction to
IoT is blurred, with CPS serving as IoT devices, and IoT devices being components of
CPS. Advances enabled by CPS are vast, including electric power generation and deliv-
ery, personalized healthcare, traffic flow management, and emergency response, as well
as in many other areas just now being envisioned. As shown in Figure 14.1, many mil-
lions of connected CPS devices will be communicating over the public network and will
provide services to their respective applications.
For many applications of CPS, the identity of devices and data generated by devices
form an important part of the overall ecosystem they are integrated in. Often, there are a
number of actors, which may be devices or humans, that participate in such ecosystems,
and who in general do not trust each other. While some actors may interact with devices
directly, they often share virtual representation of device identities and their data. The
challenge in such a situation is how actors can gain trust in the integrity of identities
and data in an explicit, measurable, testable way. Trust can be defined as reliance on the
character, ability, strength, or truth of someone or something; one in which confidence is
placed [2], or as the firm belief in the reliability, truth, or ability of someone or some-
thing [3].
Cyber-physical Systems
We define Cyber Physical Trust Systems (CPTS) as CPS which have explicit mecha-
nisms for gaining trust on integrity of identities and data built into them. This has to be
contrasted with trustworthiness of CPS, which is the combination of security, privacy,
safety, reliability, and resilience [4]. Trustworthiness is a property which is implicit to
CPS, often established as a form of certificate. It cannot be tested on a CPS system level
but exists externally to it.
Definition (Cyber Physical Trust Systems [CPTS]) A Cyber Physical Trust
System integrates computation, networking, physical processes, and explicit mechanisms
for gaining trust in integrity of data about processes.
In this chapter, we propose to use blockchain technology as a way of establishing
explicit mechanisms for gaining trust. A blockchain (or ledger), as its name suggests,
is a growing chain of blocks that contain transaction data of various types – such
as financial transactions related to exchange of assets – and linked together using
cryptography. On a blockchain, transactions are recorded chronologically, forming
an immutable chain – hence, making its data verifiable and auditable. The ledger is
distributed across all participants in the network. And because of the immutability
property of the blockchain, and a clever mix of cryptography and game theory, everyone
in the network agrees with a single copy of the blockchain. Figure 14.2 shows a pictorial
high-level view of a blockchain.
In addition to being a system of record, a blockchain can also be a platform for smart
contracts. Basically, a smart contract is an autonomous agent stored on the blockchain
and is encoded as part of a special transaction, which introduces the contract to the
blockchain. One can also view a smart contract as a state machine with its current
state somehow represented on the blockchain. Any transaction invoking a smart con-
tract stored on the blockchain will trigger its execution. Once execution is finished, all
Blockchain-Based Cyber Physical Trust Systems 267
Data Data
Block t Block t + 1
relevant actors in the network will unanimously agree on the new state of the smart
contract and record that state on the blockchain.
There are different types of blockchains. The most widely used type of blockchains are
of public type. In a public blockchain, such as Bitcoin [5] or Ethereum [6], anyone can
participate without permission. However, one can also have permissioned blockchains.
Such blockchains are built such that they grant special permissions to each participant
for specific functions to be performed – such as read, write, and access information on
the blockchain. Here, we are mainly focused on permissioned blockchains; and in par-
ticular, the Hyperledger Sawtooth, which is an open source project originally developed
by Intel [7] and now under the Hyperledger umbrella. Among the consensus options
in Sawtooth, there is a novel consensus protocol known as “Proof of Elapsed Time,” a
lottery-design consensus protocol that optionally builds on trusted execution environ-
ments provided by Intel’s Software Guard Extensions (SGX) [7].
As an application of CPTS, we will consider traceable assembly systems. Assets
as assembly systems are ubiquitous in our modern world. For various societal and
economic challenges, it is essential to provide identities to components of assembly
system, and to enable a group of untrusted economic players to create trust about iden-
tity and usage of such components. Use cases can be found in circular economy (trust
in usage of components enables reuse and supports recycling), subscription models
(instead of consumer owning assets, e.g. cars, ownership is retained with manufacturer
and consumer subscribe to asset pools of various quality), preventing fake parts in the
automobile industry [8], and various other models of refined distributed ownership of
assembly systems.
Traditional identity management is not able to provide the required level of trust in
the identity and usage of assembly systems and other real-world CPS. We have taken a
different approach based on blockchain, employing blockchain’s data immutability and
provenance, and consensus mechanisms. We obtain a blockchain-based CPTS that pro-
vides trust in the integrity of identities in assembly systems and their usage data, using
the following basic idea: We assume that physical components have digitally represented
physical identities – there are solutions available already via security tags in the form
268 IoT Security: Advances in Authentication
However, the implementation and evaluation results are missing, therefore the viability
of this approach is a big question.
Lin et al. propose a blockchain-based secure mutual authentication and access
control system for Industry 4.0 [13]. They claim to provide various security services,
including anonymous authentication, auditability, and confidentiality and privacy. The
authors utilized attribute-based signatures to achieve anonymous authentication and
fine-grained access control. Lin et al. adopted consensus procedure, which is based on
the practical byzantine fault tolerance (PBFT) approach. However, PBFT suffers from
the scalability issues as discussed in [14].
As the number of IoT devices is exploding, it is almost impossible to create an efficient
centralized authentication system. Hammi et al. propose a decentralized blockchain-
based authentication system for IoT [15]. To achieve their goals, the proposed scheme
relies on the security advantages provided by blockchains, and serves to create secure
virtual zones (bubbles) where things can identify and trust each other.
Another research focuses on blockchain-based digital identity management also
known as “BIDaaS: Blockchain based ID as a Service” [16]. This research mainly targets
identity management in mobile telecommunication networks. Three entities are being
involved: user (e.g. mobile user), BIDaaS provider (e.g. telecommunication company),
and partner of the BIDaaS provider (e.g. partner of the telecommunication company).
The basic idea of the scheme is that a mutual authentication is performed between the
user and the partner. The scheme did not utilize any pre-shared information or security
credential shared among them. More detailed survey papers on security services using
blockchain can be found in [17, 18].
then the radar can detect the speed violator, and send a message including a photograph
of the vehicle, license plate and the measured speed to the blockchain-based traffic man-
agement systems. In such a system, car authenticity, identity, and data integrity is of high
importance.
and the values are the process data, and the block number within the blockchain where
the recording took place is a timestamp.
Our scheme has three components:
• A CPS device, that, in addition to being able to compute and to communicate, has a
cryptographic identity through an asymmetric pair of keys. It is able to communicate
its identity in the form of its public key, to communicate data related to its processes,
to receive additional data, and to sign data (i.e. its process data or received data).
• A client representing one of the actors who aims to record the current process data
of the CPS device on the blockchain. All actors are registered with the blockchain.
Thus, the client can interact with the blockchain by sending transactions which will
be executed by the blockchain. The client can also communicate with the CPS device,
and will have computing capabilities, e.g. to form transactions.
• A permissioned blockchain system that stores and executes smart contracts. The
actors are permissioned to interact with the blockchain, thus transactions sent by
them will be executed by the blockchain system.
The scheme then operates using the following six steps and the flow of the proposed
approach is depicted in Figure 14.3:
1. Client wants to record process data of the CPS device on blockchain. He sends a
transaction to the blockchain that requests a nonce.
2. Blockchain processes the transaction and sends nonce back to client.
3. Client requests the CPS device to sign its current process data together with the
nonce.
4. CPS device sends the signed process data and nonce.
5. Client builds the transaction for the blockchain that contains the CPS device ID,
signed data and nonce as its payload, the action is to record the data against the device
ID on the blockchain.
6. Blockchain executes a smart contract to check authenticity of identity, data, and time
with the following steps:
⚬ Verify that the signed process data was signed by the claimed CPS device.
⚬ Check that the data was signed with the correct nonce and that the nonce has not
timed out.
⚬ If all checks are true then save the data against the ID on the blockchain.
We claim that the scheme satisfies our security requirements as described above,
under a set of regularity assumptions:
Claim. Assuming that the blockchain system is able to produce an unpredictable nonce,
and that the cryptographic primitives are secure, data, and timestamps against an ID
as recorded on the blockchain are identical to the data produced by the device ID at
the corresponding time.
Thus, this scheme achieves the security requirements of data authenticity and
integrity, and secure identity management. This realizes a CPTS.
272 IoT Security: Advances in Authentication
14.5.1.3 Non-repudiation
As shown in Figure 14.3, in each transaction, the data is signed using the private key
( i.e. sing[usage data, nonce], usage data), which is possessed by its owner entity. More
precisely, this is the only owner who can generate and use the transaction. Therefore, it
cannot deny the fact of signing a message.
1
<Requst Nonce>
2
<Nonce>
3
<Nonce>
4
<message(sign(usage date,
nonce), usage data)>
5
<transaction(action, payload)>
Figure 14.3 The proposed scheme for recording data from a CPS device on the blockchain.
Blockchain-Based Cyber Physical Trust Systems 273
Transaction
processors
Figure 14.4 A simple overview of the implemented cyber physical trust system, with a gardening fork
as an example asset of two components.
tree changes. The current Merkle root is stored in each block as the current state of
the system. Each party can verify a block by performing the given transactions from
the block on their own data and then making sure that the Merkle root of the data is
identical to the Merkle root in the block. This ensures that all parties are running code
with an identical effect in their transaction processors because if they were not, they
would produce a different Merkle root.
14.5.2.4 Client
The client is the interface that allows users to interact with the blockchain and the asset
security tags. Users can query the tags to get the public key, the usage and get the tag to
sign data.
The client can build transactions to send data to the blockchain to update the assets’
state. Some transactions are transactions to; update the usage; update the usage within a
timeframe; create assets’ digital representation on the blockchain, assemble assets into
assemblies of assets, etc.
14.5.2.5 Demonstrator
The assets in our demonstrator are forks and their security tag enhanced components.
The action of starting a leasing of a fork using the web-app client can been seen in
Figure 14.5. Here, the client will obtain the usage and signed usage from the tag, seen in
Figure 14.6, and send this in a transaction to the blockchain. As the usage is used when
determining the cost of the leasing in our model, it needs to be accurately updated at
both the start and end of a lease.
2 The NXP Mifare DESFire provides highly secure microcontroller-based ICs which can be used for provide
security tags, see https://www.nxp.com/products/identification-and-security/mifare-ics/mifare-desfire.
Blockchain-Based Cyber Physical Trust Systems 275
Figure 14.5 The demonstrator system reading and signing the security tags stored usage of 200 and
then sending this in a transaction to the blockchain where it is accepted and updated.
Figure 14.6 The running demonstrator system reading and signing, using the security tag in the fork
head, the stored usage data.
the Merkle tree root hash from the blockchain as a nonce. We can do that while
making the assumption that the blockchain system is in regular use (blocks are added
frequently), and that not all of the transactions changing the blockchain Merkle tree can
be predicted. Making those assumptions, the Merkle root hash will be unpredictable.
We note that it is a general issue with blockchain systems to generate random numbers:
As everyone must agree on the random number deterministically for there to be
consensus, it cannot be random.
Applying our results from the previous section, we can say that the demonstrator
implements a CPTS. Hence, the system provides trust in the data on usage and iden-
tity of assets. With regard to time stamps it obtains a guarantee that the usage was read
276 IoT Security: Advances in Authentication
out from the tag within the interval between the block containing the update of the usage
and the block containing the Merkle tree root that served as a nonce.
14.6 Conclusion
Data authenticity and integrity, and identity security are big security issues for an
ever-growing number of CPS and IoT devices. We have introduced blockchain-based
CPTS as CPS enhanced with blockchain as an explicit, measurable, testable system
component for providing trust in data authenticity and integrity, and identity security.
We have proposed a PKC-based approach for data exchange between devices and
blockchain, and argued that it achieves the security requirements of data authen-
ticity and integrity, and identity security. We presented results from a testbed that
implemented a CPTS for asset management.
In future work, we will conduct in-depth formal and informal security analysis of our
proposed scheme. We will also extend the testbed into a generic application for support-
ing CPTS, and conduct in-depth performance analysis ranging from theoretical testbeds
based on theoretical performance assumptions of blockchain technology, to practical
testbeds in relation to an enhanced testbed implementation. We will also explore other
application domains, in which CPTS can be applied.
References
1 Lee, E.A. and Seshia, S.A. (2017). Introduction to Embedded Systems – A
Cyber-Physical Systems Approach, 2e. MIT Press.
2 Trust. (2019). Merriam-Webster.com. https://www.merriam-webster.com/dictionary/
trust (accessed 17 July 2019).
3 Trust. (2019). Oxford Online Dictionary. https://en.oxforddictionaries.com/definition/
trust (accessed 17 July 2019).
4 Framework for Cyber-Physical Systems, Release 1.0. (2016). Cyber Physical Systems
Public Working Group, National Institute of Standards and Technology.
5 Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic system. http://Bitcoin.org
(accessed 17 July 2019).
6 Ethereum Foundation. (2014). Ethereum’s white paper. https://github.com/ethereum/
wiki/wiki/White-Paper(accessed 17 July 2019).
7 Bucci, D. (2019). Blockchain and its Emerging Role in Health IT and Health-related
research. U.S. Department of Health and Human Services, Office of the National
Coordinator for Health Information Technology.
8 Fake Vehicle parts are on the rise. https://www.gov.uk/government/news/fake-
vehicle-parts-are-on-the-rise (accessed 17 July 2019).
9 Matsumoto, S. and Reischuk, R.M. (2017). IKP: turning a PKI around with decen-
tralized automated incentives. In: 2017 IEEE Symposium on Security and Privacy
(SP), San Jose, USA (25 May 2017). San Jose, CA: IEEE.
10 Moinet, A., Darties, B. and Baril, J.-L. (2017). Blockchain-based trust & authentica-
tion for decentralized sensor networks. https://arxiv.org/abs/1706.01730 (accessed 17
July 2019).
Blockchain-Based Cyber Physical Trust Systems 277
11 Lin, Q., Yan, H., Huang, Z. et al. (2018). An ID-based linearly homomorphic signa-
ture scheme and its application in blockchain. IEEE Access 6 (99): 1.
12 Lewison, K. and Corella, F. 2016 Backing Rich Credential with Blockchain PKI.
Technical Report.
13 Lin, C., He, D., Huang, X. et al. (2018). BSeIn: a blockchain based secure mutual
authentication with fine-grained access control system for industry 4.0. Journal of
Network and Computer Applications 116: 42–52.
14 Vukolić, M. (2015). The quest for scalable blockchain fabric: proof-of-work vs. BFT
replication. In: International Workshop on Open Problems in Network Security.
Kolkata, India (16–20 December 2015): IEEE.
15 Hammi, M.T., Hammi, B., Bellot, P., and Serhrouchni, A. (2018). Bubbles of trust: a
decentralized blockchain-based authentication system for IoT. Computer & Security
78: 126–142.
16 Lee, J.H. (2017). BIDaaS: blockchain based ID as a service. IEEE Access 6 (99): 1.
17 Lin, I.C. and Liao, T.C. (2017). A survey of blockchain security issues and challenges.
International Journal on Network Security 19 (5): 653–659.
18 Salman, T., Zolanvari, M., Erbad, A. et al. (2018). Security services using
blockchains: a state of the art survey. IEEE Communications Surveys, & Tutorials
21: 858–880.
19 Khan, M.A. and Salah, K. (2018). IoT security: review, blockchain solutions, and
open challenges. Future Generation Computer Systems 82: 395–411.
20 Preuveneers, D., Joosen, W., and Zudor, E.I. (2017). Identity management for
cyber-physical production workflow and individualized manufacturing in industry
4.0. In: Proceedings of the Symposium on Applied Computing. Marrakech, Morocco
(3–7 April 2017): ACM.
279
Index
a application 45–46
Advanced Encryption Standard (AES). agriculture 47
See secret-key cryptography healthcare and telemedicine 46
Advanced Metering Infrastructure (AMI) industrial 47
35, 36, 46 intelligent transportation and logistics
adversary model 125 46–47
aggregator (Agg) 251 smart buildings, environments and
agriculture 18, 38–39, 47 cities 47–48
Application Programme Interfaces (APIs) smart grids and smart metering 46
58 broadcast by the BS 78
artificial intelligence (AI) 57 broadcast by the CH 77–78
attacks and countermeasures 29–30 by CN 77
application 34–35 network layer
agriculture 38–39 cloud computing 45
healthcare and telemedicine 36–37 Internet 45
industrial 39–40 mobile communication 44–45
intelligent transportation systems perception layer 43
37–38 perception nodes 43
smart city 40–41 sensor nodes and gateways 43–44
smart grids 35–36 authentication logic 240–241
network layer authorization 41–43
cloud computing platform 33 Automated Validation Information Security
Internet 33–34 Protocol Application (AVISPA) 47
mobile communication 33 automotive 16
perception layer 30
gateways 32 b
perception nodes 32 base station (BS) 68
sensor nodes 32 biometric-based robust access control
taxonomy 30, 31 model
Attribute Based Encryption (ABE) 44 application 135
audit logs 236 biometrics-based privacy-reserving user
augmented reality (VR) 16–17 authentication scheme 135
Auth 45 degree of transformation 133
authentication 41, 42, 231–234, 258–259 industrial internet of things applications
access control mechanisms 41 134