Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Title | Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Hossain, M., Hasan, R. |
Conference Name | 2017 IEEE International Congress on Internet of Things (ICIOT) |
Date Published | June 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5386-2011-3 |
Keywords | adversary, Attack, authentication, authorisation, Boot-IoT, Cameras, computer bootstrapping, Cyber Attacks, data privacy, Device-to-device communication, Electronics packaging, integrated circuits, Internet of Things, IoT systems, message authentication, network access, privacy, privacy-aware authentication scheme, pubcrawl, Scalability, scalable, Scalable Security, secure bootstrapping, security, security-critical operations, Service Access, smart devices, Threat |
Abstract | The Internet of Things (IoT) devices perform security-critical operations and deal with sensitive information in the IoT-based systems. Therefore, the increased deployment of smart devices will make them targets for cyber attacks. Adversaries can perform malicious actions, leak private information, and track devices' and their owners' location by gaining unauthorized access to IoT devices and networks. However, conventional security protocols are not primarily designed for resource constrained devices and therefore cannot be applied directly to IoT systems. In this paper, we propose Boot-IoT - a privacy-preserving, lightweight, and scalable security scheme for limited resource devices. Boot-IoT prevents a malicious device from joining an IoT network. Boot-IoT enables a device to compute a unique identity for authentication each time the device enters a network. Moreover, during device to device communication, Boot-IoT provides a lightweight mutual authentication scheme that ensures privacy-preserving identity usages. We present a detailed analysis of the security strength of BootIoT. We implemented a prototype of Boot-IoT on IoT devices powered by Contiki OS and provided an extensive comparative analysis of Boot-IoT with contemporary authentication methods. Our results show that Boot-IoT is resource efficient and provides better scalability compared to current solutions. |
URL | https://ieeexplore.ieee.org/document/8039048/ |
DOI | 10.1109/IEEE.ICIOT.2017.10 |
Citation Key | hossain_boot-iot:_2017 |
- message authentication
- threat
- smart devices
- Service Access
- security-critical operations
- security
- secure bootstrapping
- Scalable Security
- scalable
- Scalability
- pubcrawl
- privacy-aware authentication scheme
- privacy
- network access
- adversary
- IoT systems
- Internet of Things
- integrated circuits
- Electronics packaging
- Device-to-device communication
- data privacy
- Cyber Attacks
- computer bootstrapping
- Cameras
- Boot-IoT
- authorisation
- authentication
- attack