Document Type : Research Paper
Ferdowsi University of Mashhad
In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized in medical and everyday environments. With the promise of IoT's proactive systems, the integration of smart things into standard Internet creates several security challenges, because most Internet technologies, communication protocols and sensors are not designed to support IoT. Recent research studies have shown that launching security / privacy attacks against IoT active systems, in particular, Wearable Medical Sensor (WMS) systems, may lead to catastrophic situations and life-threatening conditions. Therefore, security threats and privacy concerns in the IoT area should be actively studied. This causes us in this paper to create a privacy authentication protocol for IoT end-devices on a four-layer structure that does not have the ability to accurately identify the device of request's sender so that some attacks can be minimized. We used the Blakley Sharing scheme to design a key generation and distribution system for secure communications between edge devices and end devices and examined the security properties of the protocol for the five common attacks in the IoT. The results of the experiments show that the proposed authentication protocol by the Blakley method is more efficient with increasing number of instructions in both fog structures and in a without fog structure, which shows a higher flexibility of the Blakley method than the Schemer because of the increasing number of instructions indicating increasing the number of nodes in the network.
of things,” International Journal of Communication
Systems Vol. 25, No. 9, pp. 1101-1102, 2012.
. H. Kopetz, “Internet of things,” In Real-time
systems, PP. 307-323, 2011.
. Z. Wang, “A privacy-preserving and accountable
authentication protocol for IoT end-devices with
weaker identity,” Future Generation Computer
. J. Kurihara, S. Kiyomoto, K. Fukushima and T.
Tanaka, “A new (k, n)-threshold secret sharing scheme
and its extension,” In International Conference on
Information Security, PP. 455-470, 2008.
. YL. Zhao, “Research on data security technology
in internet of things,” In Applied Mechanics and
Materials, Vol. 433, N0. 1, pp.1752-1755, 2013.
. T. Kothmayr, C. Schmitt, W. Hu, M. Brünig and G.
Carle, “DTLS based security and two-way
authentication for the Internet of Things,” Ad Hoc
Networks Vol.11, N0. 8, pp.2710-2723, 2013.
. M. Turkanović, B. Brumen and M. Hölbl, “A novel
user authentication and key agreement scheme for
heterogeneous ad hoc wireless sensor networks, based
on the Internet of Things notion,” Ad Hoc
Networks Vol.20, pp.96-112, 2014
. JY. Lee, WC. Lin and YH. Huang, “A lightweight
authentication protocol for internet of things,” In NextGeneration Electronics (ISNE), 2014 International
Symposium on, pp.1-2, 2014.
. R. Roman, C. Alcaraz, J. Lopez and N. Sklavos,
“Key management systems for sensor networks in the
context of the Internet of Things,” Computers &
Electrical Engineering Vol.37, No. 2, pp.147-159,
. H. Gupta, A. Vahid Dastjerdi, SK. Ghosh and R.
Buyya, “iFogSim: A toolkit for modeling and
simulation of resource management techniques in the
Internet of Things, Edge and Fog computing
environments,” Software: Practice and
Experience Vol.47, No. 9, pp. 1275-1296, 2017.
. A. Shamir, “How to share a
secret,” Communications of the ACM Vol. 22, No. 11,
pp. 612-613, 1979.
. GR. Blakley, “Safeguarding cryptographic
keys,” In Proceedings of the national computer
conference, Vol. 48, pp. 313-317, 1979.