An improved IOT Authentication Process based on Distributed OTP and Blake2

Full Text (PDF, 364KB), PP.1-8

Views: 0 Downloads: 0

Author(s)

Hind EL Makhtoum 1,* Youssef Bentaleb 1

1. Ibn Tofail University/Engineering sciences laboratory, Kenitra, Morocco

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2021.05.01

Received: 16 Jul. 2021 / Revised: 1 Aug. 2021 / Accepted: 16 Aug. 2021 / Published: 8 Oct. 2021

Index Terms

Authentication, IOT, BLAKE2, OTP, Time Complexity, Space Complexity.

Abstract

The Internet of Things operates in vital areas and involves people, objects, and networks. Indeed, it ensures the interconnection and exchange of critical information that does not tolerate flaws. A successful attack on an object in one of these fields will cause fatal damage. Therefore, securing IOTs requires particular attention to the used protocols. It is essential to choose adapted protocols to the requirements of the objects and provide maximum security. Authentication is the first entry to IOTs that must be optimal and secure, without encumbering objects with limited capacities. To address this issue and to avoid concentration points, we present an improved authentication protocol based on the Blake2 hash function and the distribution of calculating OTP function. We will then evaluate, in terms of spatial and temporal complexity, the improvement brought to the IOT authentication process by the proposed process. We will prove that the use of these technics ensure a secure authentication that consumes less time and less memory.

Cite This Paper

Hind EL Makhtoum, Youssef Bentaleb, "An improved IOT Authentication Process based on Distributed OTP and Blake2", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.11, No.5, pp. 1-8, 2021. DOI: 10.5815/ijwmt.2021.05.01

Reference

[1]T. Patel and O. Kale, “A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model,” vol. 3, no. 5, p. 8, 2014.

[2]B. R. Parikshith Nayaka S K Jeffin Boban, Aishwarya K, Arjun V., “Abnormal Pattern Analysis in Online Transaction,” vol. 7, no. 8, 2019.

[3]J.-P. Aumasson, S. Neves, Z. Wilcox-O’Hearn, and C. Winnerlein, “BLAKE2: Simpler, Smaller, Fast as MD5,” in Applied Cryptography and Network Security, vol. 7954, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 119–135. doi: 10.1007/978-3-642-38980-1_8.

[4]V. Rao and K. V. Prema, “Comparative Study of Lightweight Hashing Functions for Resource Constrained Devices of IoT,” in 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), Bengaluru, India, Dec. 2019, pp. 1–5. doi: 10.1109/CSITSS47250.2019.9031038.

[5]Jyh-Cheng Chen and Yu-Ping Wang, “Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience,” IEEE Communications Magazine, vol. 43, no. 12, p. supl.26-supl.32, Dec. 2005, doi: 10.1109/MCOM.2005.1561920.

[6]V. Rao and P. K.V., “Light-weight hashing method for user authentication in Internet-of-Things,” Ad Hoc Networks, vol. 89, pp. 97–106, Jun. 2019, doi: 10.1016/j.adhoc.2019.03.003.

[7]V. K. Sarker, T. N. Gia, H. Tenhunen, and T. Westerlund, “Lightweight Security Algorithms for Resource-constrained IoT-based Sensor Nodes,” in ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, Jun. 2020, pp. 1–7. doi: 10.1109/ICC40277.2020.9149359.

[8]K. Suankaewmanee, D. T. Hoang, D. Niyato, S. Sawadsitang, P. Wang, and Z. Han, “Performance Analysis and Application of Mobile Blockchain,” in 20f International Conference on Computing, Networking and Communications (ICNC), Maui, HI, Mar. 2018, pp. 642–646. doi: 10.1109/ICCNC.2018.8390265.

[9]P. Hagenlocher, “Performance of Message Authentication Codes for Secure Ethernet,” 2018, doi: 10.2313/NET-2018-11-1_04.

[10]R. Bonetto, N. Bui, V. Lakkundi, A. Olivereau, A. Serbanati, and M. Rossi, “Secure Communication for Smart IoT Objects: Protocol Stacks, Use Cases and Practical Examples,” p. 8.

[11]M. T. Hammi, “Sécurisation de l’Internet des objets,” p. 164.

[12]E. Andreeva, B. Mennink, B. Preneel, and M. Škrobot, “Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein,” in Progress in Cryptology - AFRICACRYPT 2012, vol. 7374, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 287–305. doi: 10.1007/978-3-642-31410-0_18.

[13]J.-P. Aumasson, W. Meier, R. C.-W. Phan, and L. Henzen, The Hash Function BLAKE. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. doi: 10.1007/978-3-662-44757-4.

[14]S. Chang et al., “Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition,” p. 84.

[15]B. Hamdane, A. Serhrouchni, A. Montfaucon, and S. Guemara, “Using the HMAC-Based One-Time Password Algorithm for TLS Authentication,” p. 8

[16]Jawahar Lal Nehru Technological University Kakinada, 533003, India, N. S. Chauhan, A. Saxena, and J. Murthy, “A Privacy-Aware Dynamic Authentication Scheme for IoT Enabled Business Services,” IJCNIS, vol. 11, no. 6, pp. 29–37, Jun. 2019, doi: 10.5815/ijcnis.2019.06.04. 

[17]Military Technical College/Electrical Engineering Department, Cairo,11571, Egypt, M. M. Samy, W. R. Anis., A. A. Abdel-Hafez, and H. D. Eldemerdash, “An Optimized Protocol of M2M Authentication for Internet of Things (IoT),” IJCNIS, vol. 13, no. 2, pp. 29–38, Apr. 2021, doi: 10.5815/ijcnis.2021.02.03.

[18]T. Yousuf, R. Mahmoud, F. Aloul, and I. Zualkernan, “Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures,” IJISR, vol. 5, no. 4, pp. 608–616, Dec. 2015, doi: 10.20533/ijisr.2042.4639.2015.0070.

[19]B S Abdur Rahman University, Vandalur, Chennai and 600048, India and S. Revathi, “Protocols for Secure Internet of Things,” IJEME, vol. 7, no. 2, pp. 20–29, Mar. 2017, doi: 10.5815/ijeme.2017.02.03.

[20]Saarinen, M-J., & Aumasson, J-P. (2015). “The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC): IETF RFC 7693”. (Request for Comments; No. 7693). Internet Engineering Task Force. https://doi.org/10.17487/RFC7693