Visible to the public An RSA Based Authentication System for Smart IoT Environment

TitleAn RSA Based Authentication System for Smart IoT Environment
Publication TypeConference Paper
Year of Publication2019
AuthorsMumtaz, Majid, Akram, Junaid, Ping, Luo
Conference Name2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
Keywordsauthentication, Authentication schemes, authorisation, Challenge/response Protocol, cryptographic protocols, cryptography, cyber physical systems, data privacy, Human Behavior, Intelligent Proxies, Internet of Things, IoT security, Metrics, NIST, PKI Trust Models, protocol design, Protocols, proxy induced security service provider, pubcrawl, public key cryptography, public key infrastructure, remote applications, Resiliency, RSA, RSA based authentication system, Scalability, security services, Servers, smart city, smart city apps, smart IoT environment, X.509 Certificate
AbstractAuthentication is the fundamental security service used in almost all remote applications. All such sensitive applications over an open network need authentication mechanism that should be delivered in a trusted way. In this paper, we design an RSA based authentication system for smart IoT environment over the air network using state-of-the-art industry standards. Our system provide security services including X.509 certificate, RSA based Public Key Infrastructure (PKI), challenge/response protocols with the help of proxy induced security service provider. We describe an innovative system model, protocol design, system architecture and evaluation against known threats. Also the implemented solution designed as an add on service for multiple other sensitive applications (smart city apps, cyber physical systems etc.) which needs the support of X.509 certificate based on hard tokens to populate other security services including confidentiality, integrity, non-repudiation, privacy and anonymity of the identities. The proposed scheme is evaluated against known vulnerabilities and given detail comparisons with popular known authentication schemes. The result shows that our proposed scheme mitigate all the known security risks and provide highest level assurance to smart gadgets.
DOI10.1109/HPCC/SmartCity/DSS.2019.00112
Citation Keymumtaz_rsa_2019