Aggregated-Proof Based Hierarchical Authentication Scheme for the

ISSN 2278 – 1447
Volume – 5, Issue-1, International Journal of Mathematical Sciences and Engineering (IJMSE), March 2016
Aggregated-Proof Based Hierarchical
Authentication Scheme for the Internet of Things
N.Suriya1,R.Monisha2, K.Prema3, J.Noorul Ameen 4
1,2,3
UG Students , 4Assistant Professor, Department of Computer Science and Engineering
4
EGS Pillay Engineering College, Nagapattinam, E-mail:[email protected]
ABSTRACT: The Internet of Things (Io T) is becoming an
backend management systems [2]. It becomes noteworthy
attractive
interconnections
to address the security issues for the ubiquitous things in
the physical, cyber, and social spaces. During the
the Io T. Recent studies have been worked on the general
interactions among the ubiquitous things, security issues
Io T ,including system models, service platforms,
through
system
paradigm to realize
become noteworthy, and it is significant to establish
infrastructure
enhanced solutions for security protection. In this work, we
architectures,
and
standardization.
Particularly, a Human-society inspired U2IoT architecture
focus on an existing U2IoT architecture (i.e., unities T and
(i.e., unit Io T and ubiquitous Io T) is proposed to achieve
ubiquitous Io T) to design an aggregated-proof based
hierarchical authentication scheme (APHA) for the layered
the physical cyber- Social convergence (as shown in Fig.
networks. Concretely, 1) the aggregated
are
1) [3]. In theU2IoT architecture, mankind neural system
established for multiple targets to achieve backward and
and social organization framework are introduced to
forward anonymous data transmission; 2)
directed
establish the single-application and multi-application Io T
descriptors homomorphism functions, and
frameworks. Multiple unit Io Ts compose a local Io T
Chebyshev chaotic maps are jointly applied for mutual
within a region, or an industrial Io T for an industry. The
path
proof
the
authentication; 3) different access authorities are assigned to
local Io Ts and industrial Io Ts are covered within a
achieve hierarchical access control. Meanwhile, the BAN
national Io T, and jointly form the ubiquitous Io T.
logic formal analysis is performed to prove that the proposed
Towards the Io T security, related works mainly refer to
APHA has no obvious security defects, and it is potentially
available for the U2IoTarchitecture and other Io T
the
security
architectures
applications.
countermeasures[4],
Keywords: U2IoT, BAN logic, APHA, Chebyshev Chaotic
communication and networking mechanisms [9], [10],
Maps.
[11], [12], [13], cryptography algorithms [14], [15], [16],
[5],
and
[6],
recommended
[7],
[8],
secure
[17], [18], [19], and application security solutions [20],
1. INTRODUCTION
[21], [22].
The Internet of Things (Io T) is emerging as an
physical
Current researches mainly refer to three aspects: system
perceptions, cyber interactions, and social correlations, in
security, network security, and application security._
which the physical objects, cyber entities, and social
System security mainly considers a whole Io T system to
attributes are required to achieve interconnections with the
identify the unique security and privacy challenges ,to
embedded intelligence [1]. During the interconnections,
design systemic security frameworks, and to provide
the Io T Is suffering from severe security challenges, and
security measures and guidelines. Network security
there are potential vulnerabilities due to the complicated
mainly focuses on wireless communication networks (e.g.,
networks referring to heterogeneous targets, sensors, and
wireless
attractive
system
paradigm
to
integrate
44
sensor
networks(WSN),
radio
frequency
ISSN 2278 – 1447
Volume – 5, Issue-1, International Journal of Mathematical Sciences and Engineering (IJMSE), March 2016
identification (RFID), and the Internet) to design key
(e.g., location). Consider in above security requirements,
distribution
protocols,
we design an aggregated proof based hierarchical
control
authentication scheme (APHA) for the unit Io T and
mechanisms, and secure routing protocols. Particularly,
ubiquitous Io T respectively, and the main contributions
authentication protocols are popular to address security
are as follows:
advanced
algorithms
signature
,authentication
algorithms,
access
and privacy issues in the Io T, and should be designed
a) Aggregated-proofs are established by wrapping
considering the things’ heterogeneity and hierarchy._
multiple
Application security serves for Io T applications (e.g.
targets’
messages
for
anonymous
data
transmission, which realizes that individual information
,multimedia, smart home, and smart grid), and resolves
cannot be revealed during both backward and forward
practical problems with particular scenario requirements.
communication channels,
However, the existing security solutions mainly provide
security approaches for a general Io T, and there is little
b) Directed path descriptors are defined based on
authentication scheme particularly designed for theU2Io T
Homomorphism functions to establish correlation during
architecture. It becomes necessary to establish an
the cross-layer interactions chebyshev chaotic maps are
Authentication scheme to realize its security protection. In
applied to describe the mapping relationships between the
this work, the main purpose is to provide bottom-up
shared secrets and the path for mutual authentication.
safeguard for the U2Io T architecture to realize .Towards
the U2IoT architecture; a reasonable authentication
c) Diverse access authorities on the group identifiers and
scheme should satisfy the following requirements.
pseudonyms are assigned to different entities for
achieving the hierarchical access control through the
and
layered networks The remainder of the paper is organized
availability):The exchanged messages between any two
as follows. Section 2 reviews the related work in the Io T
legal entities should be protected against illegal access and
security .Section 3 presents the layered system model, and
modification The communication channels should be
introduces the proposed authentication scheme. Section 4
reliable for the legal entities.
introduces the BAN logic based formal analysis. Finally,
1) Data
CIA (i.e.,
confidentiality,
integrity,
Section 5 draws a conclusion.
2) Hierarchical access control: Diverse Access authorities
2. EXISTING SYSTEM
are assigned to different entities to provide Hierarchical
interactions. An unauthorized entity Cannot access data
Top of Form
exceeding its permission.
Three-tier architecture is a client-server architecture in
3) Forward Security: Attackers cannot correlate any two
which the functional process logic, data access,
communications, Sessions, and also cannot derive the
computer data storage and user interface are developed
previous interrogations According to the ongoing session.
and maintained as independent modules on separate
platforms. Three-tier architecture is a software design
4) Mutual Authentication: The untreated entities should
pattern and well-established software architecture.
pass each Other’s verification so that only the legal entity
Three-tier architecture allows any one of the three tiers
can access the networks for data acquisition.
to be upgraded or replaced independently. The user
5) Privacy preservation: The sensors cannot correlate or
interface is implemented on a desktop PC and uses a
disclose an individual target’s private information
standard graphical user interface with different
45
ISSN 2278 – 1447
Volume – 5, Issue-1, International Journal of Mathematical Sciences and Engineering (IJMSE), March 2016
modules running on the application server. The
code he needs to contact the admin and reset the
relational database management system on the
security question and color Code.
database server contains the computer data storage
logic. The middle tiers are usually multi tiered.
3. PROPOSED SYSTEM
The proposed system works the principle of primary
authentification
of 128-bit octet asynchronous OTC
generation of code with four digits that is highly secured
and never repeated in any OTC for any user again. The
third tier of security is a combination of color codes of
multiband RGB pixel variants that template is changing
4. SYSTEM SECURITY
dynamically for every color password selected.
In this system in addition to password validation the
Roman et al. [4] pointed out that the traditional
user has been given an option of choosing color-codes
security mechanisms may not be competent for the
appearing in front of the screen. The color codes are then
heterogeneous networks; therefore improved mechanisms
validated against the already stored ones which makes the
should be designed according to the Io T infrastructures.
system highly secured one. The user has also been given
Particularly, the authors introduced cryptology based
the option of changing his password/color code based on
guidance to address the security challenges, referring to
the need
the identity management, trust governance frameworks,
fault
tolerance,
Cryptography
protocol,
identity
ownership, and privacy preservation.
5. NETWORK SECURITY
Hence et al. [9] identified the security challenges for
the user-oriented RFID systems in the Io T, and the major
challenges (e.g., privacy, ownership, data integrity,
application
 Double the level of authentication while making
integrity, and security standardization)
should be enhanced to
transactions.
achieve universal security. Yan
and When [10] applied a mobile RFID security protocol to
 Even if the user forgets the password he will be
guarantee the mobile RFID networks, and a trust third
given an option of answering some question. If
party (TTP)
he answered correct he can change the color-
introduced to construct a secure session key. Toumi et al.
combinations again that will be updated into the
[11] focused on the integration of RFID tags into IP
database.
networks, and proposed a HIP address translation scheme.
 Not all the time the user can change his
The
based
key
scheme provides
management
protocol
Is
address translation services
credentials, there are some limit. If more than
between
three times the user changes the password/color
sand IP addresses, which presents a prototype of the cross-
the tag identifier
layer Io T networks. Chang and Chen [12] reviewed the
46
ISSN 2278 – 1447
trust-based
Volume – 5, Issue-1, International Journal of Mathematical Sciences and Engineering (IJMSE), March 2016
mechanisms
(eg.cryptographic
and
PID0iDC into Hash functions for verifying DCa and iDC.
authentication) in WSNs. Raze et al. [ 13 ] presented
Note that the One-way values apply pseudo-random
Lithe, which is
numbers, which can Ensure that attackers cannot derive
an integration of datagram transport
layer security (DTLS ) and constrained
protocol
(CoAP)
to
application
the private values for Data corruption.
protect the transmission of
FORMAL ANALYSIS WITH THE BAN LOGIC
sensitive information in the Io T.
6. ARCHITECTURE
In this section, Burrows-Abadi-Needham (i.e., BAN)
logic [26] is applied to analyze the design correctness for
evaluation
method
to
detect
subtle
defects
for
authentication scheme. The formal analysis Focuses on
belief and freshness, involving the following steps:
message formalization, initial assumptions declaration,
anticipant goals declaration, and logic verification. Table
3 shows formal notations in the BAN logic.
8. APPLICATION SECURITY
Figno.1 U2 Io t Architecture
Zhou and Chao [20] established media-aware traffic
security architecture for the Io T, and the architecture is
7. SECURITY PROPERTIES
based on the current traffic classification to enable the
3.4.1 Data Confidentiality and Data Integrity
heterogeneous Multimedia services becoming available in
real-time mode. Concretely, key management, batch
Data confidentiality is mainly achieved by the Chebyshev
rekeying, authentication, watermarking, and distributed
Chaotic maps, in which the polynomials {T lTj
secret sharing are introduced in to the security
; T lSb
architecture. Realizes data confidentiality and data
; T lDCa
integrity by the directed path descript for security proof,
;
and it is a rigorous.
T liDC ; T lnDC } are defined to represent the
9. CONCLUSION
relationships of the group identifiers, pseudonyms and
directed path Descriptors. During the maps, the directed
In this paper, we have proposed an aggregated-proof
path descriptors are wrapped by the homomorphism
based Hierarchical authentication scheme for thU2IoT
function Fð:Þ. Besides, the pseudo-random numbers (i.e.,
architecture. In the APHA, two sub-protocols are
rTj; rSb; rDCa ; riDC) are applied to obtain the degree of
respectively designed for the unit Io T and ubiquitous Io T
the Chebyshev Polynomials {T x; T y; T u; T v} for
to provide bottom-security protection. The proposed
enhancing session Randomization. Data integrity is
scheme and homomorphism based Chebyshev chaotic
realized by the one-way hash and HMAC functions. In the
maps, establishes trust relationships
unit Io T, {MTj;MSb; VTj; V j DCa} are transmitted in
mechanisms and applies dynamically hashed values to
the terms of Hð:Þ and Hpjb aj ð:Þ for identify declaration
achieve session freshness. It indicates that APHA is
And verification. In the ubiquitous Io T, {MDCa; UiDC}
suitable for the U2IoT architecture.
are Respectively challenged to wrap PID0DCa and
47
via the lightweight
ISSN 2278 – 1447
Volume – 5, Issue-1, International Journal of Mathematical Sciences and Engineering (IJMSE), March 2016
REFERENCES
[1] B. Guo, D. Zhang, Z. Yu, Y. Liang, Z. Wang, and X. Zhou, ―From
The internet of things to embedded intelligence,‖ World Wide Web
J., vol. 16, no. 4, pp. 399–420, 2013.
[2] R. H. Weber, ―Internet of things—New security and privacy
Challenges,‖ Compute. Law Security Rev., vol. 26, no. 1, pp. 23–30,
2010.
[3] H. Ning and Z. Wang, ―Future internet of things architecture: Like
Mankind neural system or social organization framework?‖ IEEE
Common. Lett. vol. 15, no. 4, pp. 461–463, Apr. 2011.
[4] R. Roman, P. Najera, and J. Lopez, ―Securing the internet of Things,
Compute‖ vol. 44, no. 9, pp. 51–58, 2011.
[5] K. Lampropoulos and S. Denazis, ―Identity management directions in
future internet,‖ IEEE Commun. Mag., vol. 49, no. 12,pp. 74–83,
Dec. 2011
[6] T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar,
and K. Wehrle, ―Security challenges in the IP-based internet
ofThings,‖ Wireless Pers. Commun., vol. 61, no. 3, pp. 527–542,
2011.
[7] F. V. Meca, J. H. Ziegeldorf, P. M. Sanchez, O. G. Morchon, S. S.
Kumar, and S. L. Keoh, ―HIP security architecture for the IPbasedInternet of things,‖ in Proc. 27th Int. Conf. Adv. Inform. Netw.
Appl.Workshops, 2013, pp. 1331–1336.
[8] H. Ning, H. Liu, and L. T. Yang, ―Cyberentity security in the internet
of things,‖ Comput., vol. 46, no. 4, pp. 46–53, 2013.
[9] G. P. Hancke, K. Markantonakis, and K. E. Mayes, ―Security
challenges for user-oriented RFID applications within the ―internet
of things‖,‖ J. Internet Technol., vol. 11, no. 3, pp. 307–313, 2010.
[10] T. Yan and Q. Wen, ―Building the internet of things using a mobile
RFID security protocol based on information technology,‖ Adv. In
tell. Soft Compute., vol. 104, pp. 143–149, 2011.
[11] K. Toumi, M. Ayari, L. A. Saidane, M. Bouet, and G.
Pujolle,―HAT: HIP address translation protocol for hybrid RFID/IP
internetof things communication,‖ in Proc. Int. Conf. Commun.
WirelessEnviron. Ubiquitous Syst.: New Challenges, 2010, pp. 1–7.
[12] K. Chang and J. Chen, ―A survey of trust management in
WSNs,internet of things and future internet,‖ KSII Trans. Internet
Inform.Syst., vol. 6, no. 1, pp. 5–23, 2012.
[13] S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt,―Lithe:
Lightweight secure CoAP for the internet of things,‖ IEEE Sens. J.,
vol. 13, no. 10, pp. 3711–3720, Oct. 2013.
[14] X. Yao, X. Han, X. Du, and X. Zhou, ―A lightweight multicast
Authentication mechanism for small scale Io T applications,‖ IEEE
Sens. J., vol. 13, no. 10, pp. 3693–3701, Oct. 2013.
[15] R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, ―Key management
Systems for sensor networks in the context of the internet of
Things,‖ Compute. Elect. Eng., vol. 37, no. 2, pp. 147–159, 2011.
48