Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT
Abstract
:1. Introduction
- Present a novel secured authentication model for IoT.
- Adaptation of an optimized hybrid Elliptic Curve Cryptography (ECC)—Advanced Encryption Standard (AES) model for encryption.
- Propose a novel Self-Improved Aquila Optimizer (SI-AO) model for selecting the optimal private keys.
2. Literature Review
2.1. Problem Statement
2.2. Objectives
- One objective is to overcome the aforesaid challenges by proposing a hybrid encryption model for a secured, three-phase authentication protocol (registration phase, login phase, and authentication phase).
- To achieve this, we optimally generate the key using the metaheuristic method.
3. Processes Involved in Secured Authentication Schemes in IoT
- User registration:
- Login:
- Authentication process:
3.1. State of the Art in Secured Authentication Schemes in the IoT
- Initially, the registration phase is carried out, where encryption is accomplished with a hybrid ECC–AES model.
- Subsequently, optimal key selection is performed via SI-AO to choose the best private keys in AES.
- Further, the login and authentication phases are performed, where information flow control-oriented authentication is conducted.
- Finally, decryption is accomplished using a hybrid ECC–AES model. Figure 1 shows the overall depiction of the suggested SI-AO-oriented model.
3.2. User Registration Phase
3.3. Login Phase
- The user V enters their own cth user identity idc′, cth user password pwc′, and bio info ri′.
- After providing the info, the following factors are computed, as shown in Equations (16)–(20):
- 3.
- If the substantiation passes, the reader computes the following factors, as shown in Equations (21) and (22):
3.4. Authentication Phase
- Following the reception of the request by s from V, it initially confirms if the current timestamp is sensible. Further, didc is decrypted to attain idc and compute the following factors, as shown in Equation (23):
- 2.
- After computing the session key, s calculates Equation (25):
- 3.
- Following reception of the message from , the user initially confirms the legality of the time stamp , and Equation (26) is computed:
3.5. Decryption
4. SI-AO-Based Optimization for Optimal Key Selection Objective:
4.1. Solution Encoding
4.2. Initialization
4.3. Mathematical Model
- Step I: Extended exploration ():
- Step II: Narrow exploration ():
- Step III: Extended exploitation ():
- Step IV: Narrowed exploitation ():
5. Results and Discussions
5.1. Simulation Procedure
5.2. Simulation Platform
5.3. Attack Analysis
5.4. Convergence Analysis
5.5. Analysis of Encryption Time and Decryption Time
5.6. Analysis of Computation Time and Computation Cost
5.7. Statistical Analysis
5.8. Friedman Test
5.9. Analysis of Wilcoxon Signed-Rank Test
5.10. Analysis of Brute Force Attack and Man-in-the-Middle Attack
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
Abbreviations | Full form |
IoT | Internet of things |
AES | Advanced Encryption Standard |
ECC | Elliptic Curve Cryptography |
SI-AO | Self-Improved Aquila Optimizer |
PUF | Physical Unclonable Functions |
ILAS-IoT | Lightweight Authentication Scheme for IoT Deployments |
ESL | Ephemeral Secret Leakage |
BAN | Barrows-Abadi-Needham |
ROR | Real-or-Random |
M2M | Machine to Machine |
AO | Aquila Optimizer |
C-OBL | Chaotic Opposition Based Learning |
LA | Lion Algorithm |
BOA | Butterfly Optimization Algorithm |
SMO | Spider Monkey Optimization |
PRO | Poor and Rich Optimization |
RSA | Rivest-Shamir-Adleman |
CPA | Chosen-Plaintext Attack |
CCA | Chosen-Ciphertext Attack |
References
- Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 2019, 93, 860–876. [Google Scholar] [CrossRef]
- Conti, M.; Kaliyar, P.; Rabbani, M.M.; Ranise, S. Attestation-enabled secure and scalable routing protocol for IoT networks. Ad Hoc Netw. 2020, 98, 102054. [Google Scholar] [CrossRef]
- Deebak, B.D.; Al-Turjman, F. A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw. 2020, 97, 102022. [Google Scholar]
- Liu, L.; Ma, Z.; Meng, W. Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 2019, 101, 865–879. [Google Scholar] [CrossRef]
- Rathore, S.; Park, J.H. Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 2018, 72, 79–89. [Google Scholar] [CrossRef]
- Awan, K.A.; Din, I.U.; Zareei, M.; Talha, M.; Guizani, M.; Jadoon, S.U. HoliTrust-A holistic cross-domain trust management mechanism for service-centric Internet of Things. IEEE Access 2019, 7, 52191–52201. [Google Scholar] [CrossRef]
- Bu, L.; Isakov, M.; Kinsy, M.A. A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw. 2019, 92, 101762. [Google Scholar] [CrossRef]
- Yaser, A.; Alsahlani, F.; Popa, A. LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. J. Netw. Comput. Appl. 2021, 192, 103177. [Google Scholar]
- Alotaibi, M. Security to wireless sensor networks against malicious attacks using Hamming residue method. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 8. [Google Scholar] [CrossRef]
- Raoof, A.; Matrawy, A.; Lung, C. Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun. Surv. Tutor. 2019, 21, 1582–1606. [Google Scholar] [CrossRef]
- Xu, T.; Gao, D.; Dong, P.; Zhang, H.; Foh, C.H.; Chao, H.-C. Defending against new-flow attack in SDN-based Internet of Things. IEEE J. Mag. 2017, 5, 3431–3443. [Google Scholar] [CrossRef]
- Schweitzer, N.; Stulman, A.; Margalit, R.D.; Shabtai, A. Contradiction based gray-hole attack minimization for Ad-Hoc networks. IEEE J. Mag. 2017, 16, 2174–2183. [Google Scholar] [CrossRef]
- Lomotey, R.K.; Pry, J.; Sriramoju, S. Wearable IoT data stream traceability in a distributed health information system. Pervasive Mob. Comput. 2017, 40, 692–707. [Google Scholar] [CrossRef]
- Zhou, B.; Zhang, Q.; Shi, Q.; Yang, Q.; Yu, Y. Measuring web service security in the era of Internet of Things. Comput. Electr. Eng. 2017, 66, 305–315. [Google Scholar] [CrossRef]
- Moosavi, S.R.; Gia, T.N.; Rahmani, A.M.; Nigussie, E.; Tenhunen, H. SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput. Sci. 2015, 52, 452–459. [Google Scholar] [CrossRef]
- Sciancalepore, S.; Piro, G.; Vogli, E.; Boggia, G.; Cavone, G. LICITUS: A lightweight and standard compatible framework for securing layer-2 communications in the IoT. Comput. Netw. 2016, 108, 66–77. [Google Scholar] [CrossRef]
- Gampala, V.; Inuganti, S.; Muppidi, S. Data security in cloud computing with elliptic curve cryptography. Int. J. Soft Comput. Eng. IJSCE 2012, 2, 1–14. [Google Scholar]
- Memos, V.A.; Psannis, K.E.; Ishibashi, Y.; Kim, B.G.; Gupta, B.B. An efficient algorithm for media-based surveillance system (EAMSuS) in IoT smart city framework. Future Gener. Comput. Syst. 2017, 83, 619–628. [Google Scholar] [CrossRef]
- Tedeschi, S.; Mehnen, J.; Tapoglou, N.; Roy, R. Secure IoT devices for the maintenance of machine tools. Procedia CIRP 2017, 59, 150–155. [Google Scholar] [CrossRef]
- Rana, M.; Shafiq, A.; Altaf, I.; Alazab, M.; Mahmood, K.; Chaudhry, S.A.; Bin Zikria, Y. A secure and lightweight authentication scheme for next generation IoT infrastructure. Comput. Commun. 2021, 165, 85–96. [Google Scholar] [CrossRef]
- Melki, R.; Noura, H.N.; Chehab, A. Lightweight multi-factor mutual authentication protocol for IoT devices. Int. J. Inf. Secur. 2020, 19, 679–694. [Google Scholar] [CrossRef]
- Fotouhi, M.; Bayat, M.; Doostari, M.A. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Netw. 2020, 177, 107333. [Google Scholar] [CrossRef]
- Alzahrani, B.A.; Chaudhry, S.A.; Barnawi, A. ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment. J. Ambient. Intell. Hum. Comput. 2020, 13, 5123–5135. [Google Scholar] [CrossRef]
- Khalid, U.; Asim, M.; Baker, T. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 2020, 23, 2067–2087. [Google Scholar] [CrossRef]
- Das, A.K.; Bera, B.; Wazid, M.; Jamal, S.S.; Park, Y. On the security of a secure and lightweight authentication scheme for next generation IoT infrastructure. IEEE Access 2021, 9, 71856–71867. [Google Scholar] [CrossRef]
- Jebri, S.; Amor, A.B.; Abid, M. Enhanced lightweight algorithm to secure data transmission in IoT systems. Wirel. Pers. Commun. 2021, 116, 2321–2344. [Google Scholar] [CrossRef]
- Seunghwan, S.; Park, Y.; Park, Y. A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments. Sustainability 2021, 13, 9241. [Google Scholar] [CrossRef]
- Ehui, B.B.; Han, Y.; Guo, H.; Liu, J. A Lightweight Mutual Authentication Protocol for IoT. J. Commun. Inf. Netw. 2022, 7, 181–191. [Google Scholar] [CrossRef]
- Chen, C.M.; Liu, S. Improved secure and lightweight authentication scheme for next-generation IOT infrastructure. Secur. Commun. Netw. 2021, 2021, 6537678. [Google Scholar] [CrossRef]
- Yin, A.; Wang, S. A novel encryption scheme based on timestamp in gigabit ethernet passive optical network using AES-128. Optik 2014, 125, 1361–1365. [Google Scholar] [CrossRef]
- Abualigah, L.; Yousri, D.; Elaziz, M.A.; Ewees, A.A.; Mohammed, A.A.A.-Q.; Gandomi, A.H. Aquila optimizer: A novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
- Mahajan, S.; Abualigah, L.; Pandit, A.K.; Altalhi, M. Hybrid Aquila optimizer with arithmetic optimization algorithm for global optimization tasks. Soft Comput. 2022, 26, 4863–4881. [Google Scholar] [CrossRef]
- Wagh, M.B.; Gomathi, N. Improved GWO-CS algorithm-based optimal routing strategy in VANET. J. Netw. Commun. Syst. 2019, 2, 34–42. [Google Scholar]
- Halbhavi, B.S.; Kodad, S.F.; Ambekar, S.K.; Manjunath, D. Enhanced invasive weed optimization algorithm with chaos theory for weightage based combined economic emission dispatch. J. Comput. Mech. Power Syst. Control. 2019, 2, 19–27. [Google Scholar]
- Jadhav, A.N.; Gomathi, N. DIGWO: Hybridization of dragonfly algorithm with improved grey wolf optimization algorithm for data clustering. Multimed. Res. 2019, 2, 1–11. [Google Scholar]
- Boothalingam, R. Optimization using lion algorithm: A biological inspiration from lion’s social behavior. Evol. Intell. 2018, 11, 31–52. [Google Scholar] [CrossRef]
- Arora, S.; Singh, S. Butterfly optimization algorithm: A novel approach for global optimization. Soft Comput. 2019, 23, 715–734. [Google Scholar] [CrossRef]
- Harish, S.; Garima, H.; Jagdish, B. Spider monkey optimization algorithm. In Evolutionary and Swarm Intelligence Algorithms; Springer: Berlin/Heidelberg, Germany, 2019; Volume 779, pp. 43–59. [Google Scholar]
- Seyyed, M.; Vahid, B. Poor and rich optimization algorithm: A new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 2019, 86, 165–181. [Google Scholar]
Author | Deployed Schemes | Features | Challenges |
---|---|---|---|
Minahil et al. [20] | CK-adversary model | Higher security Safeguards anonymity | Need to consider the practical implementation |
Ahmed et al. [8] | Fuzzy scheme | Less overhead Minimal cost | Needs deliberation on blockchain technologies |
Das et al. [25] | Secure and lightweight authentication scheme | Minimizes cost Enhanced security | Needs research on machine-to-machine (M2M) security schemes |
Mahdi et al. [22] | Real-or-Random (ROR) scheme | Minimal cost Secure and efficient | Should focus on improving execution time. |
Alzahrani et al. [23] | Fuzzy Probabilistic Generation | Minimal complexity Minimal overhead | Stolen verifier attack should be considered. |
Khalid et al. [24] | Elliptic Curve Digital Signature Algorithm (ECDSA) | Needs minimal power Reduced power | Lightweight consensus score was not computed |
Jebri et al. [26] | ECC | Ensures trust Minimal time cost | Needs consideration on computing resources |
Melki et al. [21] | ROR model | Low cost Higher robustness | Requires more time |
Son et al. [27] | Hash exclusive-or operations | Higher security Higher performance | Mostly suiTable in IoT contexts |
Ehui et al. [28] | Simple mutual authentication system | Good security Good performance | Requires a suiTable technique to assess protocol |
Methods | Encryption Time | Decryption Time |
---|---|---|
Distant user authenticated protocol [20] | 0.0267 | 0.0226 |
Secure and lightweight authentication scheme [25] | 0.0224 | 0.0256 |
BlowFish | 1.2502 | 1.0388 |
RSA | 0.10865 | 0.10886 |
ElGamal | 0.016656 | 0.032491 |
LA | 0.018907 | 0.025421 |
BOA | 0.016194 | 0.037711 |
SMO | 0.01574 | 0.024191 |
AO | 0.015745 | 0.024057 |
PRO | 0.015473 | 0.023785 |
SI-AO | 0.014281 | 0.022525 |
Methods | Computation Time |
---|---|
LA | 32.051 |
BOA | 33.415 |
SMO | 20.795 |
AO | 20.676 |
PRO | 62.465 |
SI-AO | 20.012 |
Methods | Computation Cost |
---|---|
LA | −0.1608 |
BOA | −0.16664 |
SMO | −0.1608 |
AO | −0.16813 |
PRO | −0.16138 |
SI-AO | −0.18931 |
Methods | Best | Worst | Mean | Median | Std |
---|---|---|---|---|---|
LA | −0.1608 | −0.12961 | −0.15855 | −0.1608 | 0.0078522 |
BOA | −0.16664 | −0.16664 | −0.16664 | −0.16664 | 2.83E−17 |
SMO | −0.1608 | −0.12961 | −0.15883 | −0.1608 | 0.0065853 |
AO | −0.16813 | −0.12961 | −0.15994 | −0.16813 | 0.013225 |
PRO | −0.16138 | −0.15749 | −0.15967 | −0.16138 | 0.0019707 |
SI-AO | −0.18931 | −0.12961 | −0.17371 | −0.18931 | 0.018922 |
Methods | Best | Worst | Mean | Median | Std |
---|---|---|---|---|---|
LA | −0.13338 | 0.20836 | −0.034569 | −0.080333 | 0.1379 |
BOA | −0.096264 | 0.16962 | −0.025719 | −0.08559 | 0.1127 |
SMO | −0.13338 | 0.20836 | −0.041368 | −0.080333 | 0.1425 |
AO | −0.08886 | 0.1806 | 0.026558 | −0.054052 | 0.1413 |
PRO | −0.11499 | −0.010926 | −0.069182 | −0.063782 | 0.041 |
SI-AO | −0.13724 | −0.096563 | −0.12124 | −0.12221 | 0.0156 |
Methods | Rank |
---|---|
p-value | 1.698 × 10−8 |
Sigma | 1.8439 |
LA | 4.6429 |
BOA | 2.4762 |
SMO | 4.6429 |
AO | 2.619 |
PRO | 4.4762 |
SI-AO | 2.1429 |
Methods | LA | BOA | SMO | AO | PRO | SI-AO |
---|---|---|---|---|---|---|
Probability | 1.31 × 10−6 | 5.73 × 10−7 | 1.83 × 10−6 | 5.49 × 10−6 | 6.41 × 10−6 | 7.35 × 10−6 |
Normal (Z) statistic | −4.8378 | −5 | −4.7717 | −4.5451 | −4.5124 | −4.4833 |
Attacks | LA | BOA | SMO | AO | PRO | SI-AO |
---|---|---|---|---|---|---|
Brute force Attack | 0.001337 | 0.001352 | 0.0010417 | 0.0004261 | 0.0012743 | 0.0015732 |
Man-in-the-Middle Attack | 0.60239 | 0.50026 | 0.11024 | 0.6581 | 0.40313 | 0.70112 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Munshi, A.; Alshawi, B. Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT. J. Sens. Actuator Netw. 2024, 13, 41. https://doi.org/10.3390/jsan13040041
Munshi A, Alshawi B. Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT. Journal of Sensor and Actuator Networks. 2024; 13(4):41. https://doi.org/10.3390/jsan13040041
Chicago/Turabian StyleMunshi, Amr, and Bandar Alshawi. 2024. "Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT" Journal of Sensor and Actuator Networks 13, no. 4: 41. https://doi.org/10.3390/jsan13040041
APA StyleMunshi, A., & Alshawi, B. (2024). Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT. Journal of Sensor and Actuator Networks, 13(4), 41. https://doi.org/10.3390/jsan13040041