LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)

被引:39
作者
Shah, Syed W. [1 ]
Syed, Naeem F. [1 ]
Shaghaghi, Arash [1 ]
Anwar, Adnan [1 ]
Baig, Zubair [1 ]
Doss, Robin [1 ]
机构
[1] Deakin Univ, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic, Australia
关键词
Zero trust architecture (ZTA); Continuous authentication; Device-to-Device communication; Internet of things (IoT); Resource constrained devices;
D O I
10.1016/j.cose.2021.102351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continuous Authentication (CA) has been proposed as a potential solution to counter com-plex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user's behavioural characteristics cannot be extended to contin-uously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Ex -isting d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathemat-ical function to generate dynamically changing session keys for continuous device authen-tication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:25
相关论文
共 36 条
[1]   Techniques and algorithms for access control list optimization [J].
Al Abdulmohsin, Ibrahim M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (04) :556-566
[2]   Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff [J].
Aman, Muhammad Naveed ;
Taneja, Sachin ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Alioto, Massimo .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2843-2859
[3]  
[Anonymous], P WESS 15 WORKSH EMB
[4]   Fast authentication in wireless sensor networks [J].
Benzaid, Chafika ;
Lounis, Karim ;
Al-Nemrat, Ameer ;
Badache, Nadjib ;
Alazab, Mamoun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :362-375
[5]  
Bezawada B., 2018, ARXIV PREPRINT ARXIV
[6]  
Brewster T., 2018, WE BROKE BUNCH ANDRO
[7]   S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol [J].
Chen, Dajiang ;
Zhang, Ning ;
Qin, Zhen ;
Mao, Xufei ;
Qin, Zhiguang ;
Shen, Xuemin ;
Li, Xiang-Yang .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :88-100
[8]   DISTANCE ESTIMATION FROM RECEIVED SIGNAL STRENGTH UNDER LOG-NORMAL SHADOWING: BIAS AND VARIANCE [J].
Chitte, Sri Divya ;
Dasgupta, Soura .
ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, :256-259
[9]   A Lightweight Continuous Authentication Protocol for the Internet of Things [J].
Chuang, Yo-Hsuan ;
Lo, Nai-Wei ;
Yang, Cheng-Ying ;
Tang, Ssu-Wei .
SENSORS, 2018, 18 (04)
[10]   Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication [J].
DeCusatis, Casimer ;
Liengtiraphan, Piradon ;
Sager, Anthony ;
Pinelli, Mark .
2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, :5-10