A Novel Light Weight and Automatic Authentication based on Centralized Approach for Pervasive Environment

A Novel Light Weight and Automatic Authentication Approach for Pervasive Environment

Authors

  • Muhammad Nawaz Khan Department of Computing, Shaheed Zulfikar Ali Bhutto Institute of Science & Technology (SZABIST), Islamabad, Pakistan
  • Muhammad Nazir Department of Computing, Shaheed Zulfikar Ali Bhutto Institute of Science & Technology (SZABIST), Islamabad, Pakistan

Keywords:

Pervasive computing, context awareness, ambient intelligence, middle ware, embedded devices, ad hoc network, man in middle, DoS

Abstract

Today is the age of hyper-connectivity, no standalone system ever exist. Now each device has the processing and communicating capabilities. Pervasive computing brings all these devices into a uniform layer for ease of use and for providing on fly services. In pervasive environments, smart devices communicate each other to provide pervasive services according to the user modes and contexts. To construct an ad hoc and un-structure network of heterogeneous entities and to standardize all different technologies into a uniform solution, many technical and functional challenges are need to be addressed. With dissimilar nature and distributed control over the resources in unfriendly situation the pervasive environments always in trouble due to lack of proper security system. For consistent dynamic flow of services in an ad hoc pervasive network, the authentication of users, devices, services and process are critical. Here in this research work we proposed “A novel light weight and automatic authentication scheme based on centralized approach for pervasive environment”. In this approach a central base station is responsible for providing resources and implementing security policy for all entities. Public Keys, Public key Certificates, Nonce, IDs and time stamps are parameters used in the proposed scheme. The new scheme is validated and analyzed in a simulator in the presence of attacker. The proposed model is designed to prevent most sophisticated DoS attacks and man in middle attacks.

References

Brush. A., J. Hong & J. Scott, Pervasive computing Moves in, IEEE Pervasive Computing 15: 14-15 (2016).

Carteron. A, C. Consel & N. Volanschi. Improving the Reliability of Pervasive Computing Applications By Continuous Checking of Sensor Readings. In: IEEE International Conference on Ubiquitous Intelligence and Computing, Toulouse, France (2016).

Weiser. M, The computer for the 21st century. Scientific American 265: 94-104 (1991).

Huang. A.C., B.C. Ling & S. Ponnekanti. Pervasive Computing: What is it good for. In: Proceedings of the 1st ACM International Workshop on Data Engineering for Wireless and Mobile Access, p. 84-91 (1999).

McKernan. K.J. The Chloroplast Genome Hidden in Plain Sight, Open Access Publishing and Antifragile Distributed Data Sources. Mitochondrial DNA, p. 1-2 (2015).

Rudolph. L. Project Oxygen: Pervasive, HumanCentric Computing, an initial experience. In: International Conference on Advanced Information Systems Engineering, p. 1-12 (2001).

Ceesay. E.N., C. Chandersekaran & W.R. Simpson. An Authentication Model for Delegation, Attribution and Least Privilege. In: Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments. p. 30 (2010).

Foster. I., C. Kesselman, G. Tsudik & S.A. Tuecke. Security Architecture for Computational Grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security. p. 83-92 (1998).

Turkanovi. M., B. T. Brumen & M. Holbl. A Novel User Authentication and Key Agreement Scheme for Heterogeneous Ad hoc Wireless Sensor Networks based on Internet of Things Notion. In: Ad Hoc Networks, 20, p. 96-112 (2014).

Farash. M.S., M. Turkanovia, S. Kumari & M. Holbl. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. In: Ad Hoc Networks, 36, P 152-176 (2016).

Sethi. M., P. Kortoasi, M. Di Francesco & T. Aura. Secure and low-power authentication for resourceconstrained device. In: Internet of Things (IOT), 2015 5th International Conference on the Internet of Things (IOT), p. 30-36 (2015).

Sher. M. & T. Magedanz. Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks. In: Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, p. 1724 (2006).

Ning. H., H. Liu & L.T. Yang. Aggregated-Proof based Hierarchical Authentication Scheme for Internet of Things. In: IEEE Transactions on Parallel and Distributed Systems, 26. p. 657-667 (2015).

Jan. M.A, P. Nanda, X. He, Z. Tan & R.P. Liu. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. p. 205-211 (2014).

Marta-n-Fern A¡ndez. F, P. Caballero-Gil & C. N. Caballero-Gil. Authentication Based on NonInteractive Zero-Knowledge Proofs for Internet of Things. In: Sensors, 16, P 75 (2016).

Wang. X., L.Y. Yin & H. Yu. Finding collisions in the full SHA-1. In: Annual International Cryptology Conference, p. 17-36 (2005). 17. Juels. A. RFID security and Privacy: A Research Survey. In: IEEE journal on selected areas in communications, 24. P 381-394 (2006).

Zhu. F., M.W. Mutka & L.M. Ni. Private Entity Authentication for Pervasive Computing Environments. In: IJ Network Security, 14: p. 86100 (2012).

Kambourakis. G., S. Gritzalis. & J.H. Park. Device Authentication in Wireless and Pervasive Environments. In: Intelligent Automation & Soft Computing, 16: p. 399-418 (2010).

Bahl. P., A. Adya, J. Padhye & A. Walman. Reconsidering Wireless Systems with Multiple Radios. In: ACM SIGCOMM Computer Communication Review, 34, P 39-46, (2004)

Committee. I.L. M.S. IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed bands and Corrigendum 1. In: IEEE Std 802.16-2004/Cor 12005, (2006).

Group. T, TCG Specification Architecture Overview Revision 1.2. (2004).

Wen. H.A, C.L. Lin & T. Hwang. Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients. In: Computers & Security, 25: p. 106-113 (2006).

Rekha. R. N & M. Prasad Babu. On some security issues in pervasive computing-light weight cryptography. International Journal on Computer Science and Engineering, 4: 267 (2012).

Betz. V, J. Rose & A. Marquardt. In: Architecture and CAD for Deep-submicron FPGAs 497. Springer Science & Business Media (2012). 26. Landis. D. Programmable Logic and Application Specific integrated Circuits. (1999).

Abi-Char. P.E, A. Mhamed & E.H. Bachar. A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In: The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), p. 235-240 (2007).

El Husseini. A, A. Mac hamed, B.E. Hassan & M. Mokhtari. A novel trust-based authentication scheme for low-resource devices in smart environments. Procedia Computer Science, 5: 362369 (2011).

Zhu. Z. & G. Cao. Applaus: A privacy-preserving location proof updating system for location-based services. In: INFOCOM, 2011 Proceedings IEEE, p. 1889-1897 (2011).

Batyuk. L., S. L. Camtepe & S. Albayrak. Multidevice key management using visual side channels in pervasive computing environments. In: International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), p. 207-214 (2011).

Morshed. M.M, A. Atkins & H. Yu. Secure ubiquitous authentication protocols for RFID Systems. EURASIP Journal on Wireless Communications and Networking. p. 1-13 (2012).

Lee. S.L., Y.L. Hwang, D.H. Lee & J.I. Lim. Efficient authentication for low-cost RFID systems. In International Conference on Computational Science and Its Applications, p. 619-627 (2005).

Choi. E.Y, S.M. Lee & D. H. Lee. Efficient RFID authentication protocol for ubiquitous computing environment. In: International Conference on Embedded and Ubiquitous Computing, p. 945-954 (2005).

Morshed. M.M, A. Atkins & H. Yu. Privacy and security protection of RFID data in E-passport. In: 5th International Conference on Software, Knowledge Information, Industrial Management and Applications (SKIMA), p. 1-7 (2011).

Kim. S.J & S.K. Gupta. Audio-based Selforganizing Authentication for Pervasive Computing: A cyber-physical approach. In: 2009 International Conference on Parallel Processing Workshops, p. 362-369 (2009).

Datta. A, A. Derek, J.C. Mitchell & D. Pavlovic. A derivation system for security protocols and its logical formalization. In: Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, p. 109-125 (2003).

Brands. S. & D. Chaum. Distance-bounding protocols. In: Workshop on the Theory and Application of Cryptographic Techniques, p. 344359 (1993).

Lee. Y.K, L. Batina, D. SingelAae & I. Verbauwhede. Low-cost untraceable authentication protocols for RFID. In: Proceedings of the Third ACM Conference on Wireless Network Security, p. 55-64 (2010).

Lee. Y.K, L. Batina & I. Verbauwhede. Untraceable RFID authentication protocols: Revision of EC-RAC. In: 2009 IEEE International Conference on RFID. p. 178-185 (2009).

Schnorr. C.P. Efficient Identification and signatures for smart cards. In: Conference on the Theory and Application of Cryptology, p. 239-252 (1989).

Liu. H. & C.M. Zhang. Research on Use of Distributed Authentication in Pervasive Computing. In: 2006 First International Symposium on Pervasive Computing and Applications (2006).

Desmedt. Y.D. Threshold Cryptography. In: European Transactions on Telecommunications, 5: p. 449-458 (1994).

Jang. E.G, B.S. Koh & Y.R. Choi. An Authentication Mechanism of Digital Contents in Pervasive Computing Environment. In: International Conference on Information Security and Assurance, 2008. ISA 2008, p. 527-533 (2008).

Eskicioglu. A.M & E.J. Delp. An Overview of Multimedia Content Protection in Consumer Electronics Devices. Signal Processing: Image Communication, 16: p. 681-699 (2001).

Published

2021-05-06

How to Cite

Khan, M. N. ., & Nazir, M. . (2021). A Novel Light Weight and Automatic Authentication based on Centralized Approach for Pervasive Environment: A Novel Light Weight and Automatic Authentication Approach for Pervasive Environment. Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, 53(3), 293–307. Retrieved from http://ppaspk.org/index.php/PPAS-A/article/view/282

Issue

Section

Articles