ABSTRACT:
The Internet of Things (IoT) is becoming
an attractive system paradigm to realize interconnections through the physical,
cyber, and social spaces. During the interactions among the ubiquitous things,
security issues become noteworthy, and it is significant to establish enhanced
solutions for security protection. In this work, we focus on an existing U2IoT
architecture (i.e., unit IoT and ubiquitous IoT), to design an aggregated-proof
based hierarchical authentication scheme (APHA) for the layered networks.
Concretely, 1) the aggregated-proofs are established for multiple targets to
achieve backward and forward anonymous data transmission; 2) the directed path
descriptors, homomorphism functions, and Chebyshev chaotic maps are jointly
applied for mutual authentication; 3) different access authorities are assigned
to achieve hierarchical access control. Meanwhile, the BAN logic formal
analysis is performed to prove that the proposed APHA has no obvious security
defects, and it is potentially available for the U2IoT architecture and other
IoT applications.
INTRODUCTION:
The Internet of Things (IoT) is emerging as an attractive system paradigm to integrate physical perceptions, cyber interactions, and social correlations, in which the physical objects, cyber entities, and social attributes are required to achieve interconnections with the embedded intelligence. During the interconnections, the IoT is suffering from severe security challenges, and there are potential vulnerabilities due to the complicated networks referring to heterogeneous targets, sensors, and backend management systems. It becomes noteworthy to address the security issues for the ubiquitous things in the IoT.
Recent studies have been worked on the general IoT, including system models, service platforms, infrastructure architectures, and standardization. Particularly, a human-society inspired U2IoT architecture (i.e., unit IoT and ubiquitous IoT) is proposed to achieve the physical cyber- social convergence in the U2IoT architecture, mankind neural system and social organization framework are introduced to establish the single-application and multi-application IoT frameworks.
Multiple unit IoTs compose a local IoT within a region, or an industrial IoT for an industry. The local IoTs and industrial IoTs are covered within a national IoT, and jointly form the ubiquitous IoT. Towards the IoT security, related works mainly refer to the security architectures and recommended countermeasures secure communication and networking mechanisms cryptography algorithms and application security solutions.
Current researches mainly refer to three aspects: system security, network security, and application security.
_ System security mainly considers a whole IoT system to identify the unique security and privacy challenges, to design systemic security frameworks, and to provide security measures and guidelines.
_ Network security mainly focuses on wireless communication networks (e.g., wireless sensor networks (WSN), radio frequency identification (RFID), and the Internet) to design key distribution algorithms, authentication protocols, advanced signature algorithms, access control mechanisms, and secure routing protocols. Particularly, authentication protocols are popular to address security and privacy issues in the IoT, and should be designed considering the things’ heterogeneity and hierarchy.
_ Application security serves for IoT applications (e.g.., multimedia, smart home, and smart grid), and resolves practical problems with particular scenario requirements.
Towards the U2IoT architecture, a reasonable authentication scheme should satisfy the following requirements. 1) Data CIA (i.e., confidentiality, integrity, and availability): The exchanged messages between any two legal entities should be protected against illegal access and modification. The communication channels should be reliable for the legal entities. 2) Hierarchical access control: Diverse access authorities are assigned to different entities to provide hierarchical interactions.
An unauthorised entity cannot access
data exceeding its permission. 3) Forward security: Attackers cannot correlate
any two communication sessions, and also cannot derive the previous
interrogations according to the ongoing session. 4) Mutual authentication: The
untrusted entities should pass each other’s verification so that only the legal
entity can access the networks for data acquisition. 5) Privacy preservation:
The sensors cannot correlate or disclose an individual target’s private
information (e.g., location). Considering above security requirements, we
design an aggregated proof based hierarchical authentication scheme (APHA) for
the unit IoT.
EXISTING SYSTEM:
Existing WSN network is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such a channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow analyze not only the applicability.
Existing mechanisms such as public key cryptography and
pre-shared keys for sensor nodes in the IoT context, but also the applicability
of those link-layer oriented key management systems (KMS) whose original
purpose is to provide shared keys for sensor nodes belonging to the same WSNs
to provide key management mechanisms to allow that two remote devices can
negotiate certain security certificates (e.g., shared keys, Blom key pairs, and
polynomial shares). The authors analyzed the applicability of existing mechanisms,
including public key infrastructure (PKI) and pre-shared keys for sensor nodes
in IoT contexts.
DISADVANTAGES:
Smart community model for IoT
applications, and a cyber-physical system with the networked smart homes was
introduced with security considerations. Filtering false network traffic and
avoiding unreliable home gateways are suggested for safeguard. Meanwhile, the
security challenges are discussed, including the cooperative authentication,
unreliable node detection, target tracking, and intrusion detection group of individuals that hacked into federal sites and
released confidential information to the public in the government is supposed
to have the highest level of security, yet their system was easily
breached. Therefore,
if all of our information is stored on the internet, people could hack into it,
finding out everything about individuals lives. Also, companies could
misuse the information that they are given access to. This is a common mishap that occurs
within companies all the time.
PROPOSED SYSTEM:
We proposed scheme realizes data confidentiality and data integrity by the directed path descriptor and homomorphism based Chebyshev chaotic maps, establishes trust relationships via the lightweight mechanisms, and applies dynamically hashed values to achieve session freshness. It indicates that the APHA is suitable for the U2IoT architecture.
In this work, the main purpose is to provide bottom-up safeguard for the U2IoT architecture to realize secure interactions. Towards the U2IoT architecture, a reasonable authentication scheme should satisfy the following requirements.
1) Data CIA (i.e., confidentiality, integrity, and availability): The exchanged messages between any two legal entities should be protected against illegal access and modification. The communication channels should be reliable for the legal entities.
2) Hierarchical access control: Diverse access authorities are assigned to different entities to provide hierarchical interactions. An unauthorised entity cannot access data exceeding its permission.
3) Forward security: Attackers cannot correlate any two communication sessions, and also cannot derive the previous interrogations according to the ongoing session.
4) Mutual authentication: The untrusted entities should pass each other’s verification so that only the legal entity can access the networks for data acquisition.
5) Privacy preservation: The sensors cannot correlate or disclose an individual target’s private information (e.g., location). Considering above security requirements, we design an aggregated proof based hierarchical authentication scheme (APHA) for the ubiquitous IoT.
ADVANTAGES:
Aggregated-proofs are established by wrapping multiple targets’ messages for anonymous data transmission, which realizes that individual information cannot be revealed during both backward and forward communication channels.
Directed path descriptors are defined based on homomorphism functions to establish correlation during the cross-layer interactions. Chebyshev chaotic maps are applied to describe the mapping relationships between the shared secrets and the path descriptors for mutual authentication.
Diverse access authorities on the group
identifiers and pseudonyms are assigned to different entities for achieving the
hierarchical access control through the layered networks.
HARDWARE REQUIREMENT: