Collaborative Mutual Identity Establishment (CMIE) for the future internet

Author:

Ambritta P Nancy,Railkar Poonam N.,Mahalle Parikshit N.

Abstract

Purpose – This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack. Design/methodology/approach – This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality. Findings – The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Research limitations/implications – Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose. Originality/value – The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.

Publisher

Emerald

Subject

General Computer Science,Theoretical Computer Science

Reference19 articles.

1. Ambritta, N.P. , Railkar, P.N. and Mahalle, P.N. (2014), “Proposed identity and access management in future internet (IAMFI): a behavioral modeling approach”, Journal of ICT , Vol. 2 No. 1, pp. 1-36.

2. Armando, A. , Basin, A. , Boichut, Y. , Chevalier, Y. , Compagna, L. , Cuellar, J. , Hankes Drielsma, P. , He’am, P.C. , Kouchnarenko, O. , Mantovani, J. , Modersheim, S. , von Oheimb, D. , Rusinowitch, M. , Santiago, J. , Turuani, M. , Vigan’o, L. and Vigneron, L. (2005), Springer-Verlag Berlin Heidelberg . The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, pp. 281-285.

3. AVISPA Web Interface (2015), “The Avispa Project”, available at: www.avispa-project.org/web-interface/basic.php (accessed 13 September 2015).

4. Chan, A.C.-F. and Zhou, J. (2014), “Cyber–physical device authentication for the smart grid electric vehicle ecosystem”, IEEE Journal on Selected Areas in Communications , Vol. 3 No. 7, pp. 1509-1517.

5. Cirani, S. , Picone, M. , Gonizzi, P. , Veltri, L. and Ferrari, G. (2015), “IoT-OAS: an OAuth-based authorization service architecture for secure services in IoT scenarios”, IEEE Sensors Journal , Vol. 15 No. 2., pp. 1224-1234.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3