A Rabin Cryptosystem-Based Lightweight Authentication Protocol and Session Key-Generation Scheme for IoT Deployment: Authentication in IoT

A Rabin Cryptosystem-Based Lightweight Authentication Protocol and Session Key-Generation Scheme for IoT Deployment: Authentication in IoT

Priyanka Ahlawat, Ankit Attkan
ISBN13: 9781799869887|ISBN10: 1799869881|ISBN13 Softcover: 9781799869894|EISBN13: 9781799869900
DOI: 10.4018/978-1-7998-6988-7.ch006
Cite Chapter Cite Chapter

MLA

Ahlawat, Priyanka, and Ankit Attkan. "A Rabin Cryptosystem-Based Lightweight Authentication Protocol and Session Key-Generation Scheme for IoT Deployment: Authentication in IoT." Implementing Data Analytics and Architectures for Next Generation Wireless Communications, edited by Chintan Bhatt, et al., IGI Global, 2022, pp. 88-106. https://doi.org/10.4018/978-1-7998-6988-7.ch006

APA

Ahlawat, P. & Attkan, A. (2022). A Rabin Cryptosystem-Based Lightweight Authentication Protocol and Session Key-Generation Scheme for IoT Deployment: Authentication in IoT. In C. Bhatt, N. Kumar, A. Bashir, & M. Alazab (Eds.), Implementing Data Analytics and Architectures for Next Generation Wireless Communications (pp. 88-106). IGI Global. https://doi.org/10.4018/978-1-7998-6988-7.ch006

Chicago

Ahlawat, Priyanka, and Ankit Attkan. "A Rabin Cryptosystem-Based Lightweight Authentication Protocol and Session Key-Generation Scheme for IoT Deployment: Authentication in IoT." In Implementing Data Analytics and Architectures for Next Generation Wireless Communications, edited by Chintan Bhatt, et al., 88-106. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-6988-7.ch006

Export Reference

Mendeley
Favorite

Abstract

Handling unpredictable attack vulnerabilities in self-proclaiming secure algorithms in WSNs is an issue. Vulnerabilities provide loop holes for adversary to barge in the privacy of the network. Attacks performed by the attacker can be active or passive. Adversary may listen to the sensitive information and exploit its confidentiality which is passive, or adversary may modify sensitive information being transferred over a WSN in case of active attacks. As Internet of things has basically three layers, middle-ware layer, Application layer, perceptron layer, most of the attacks are observed to happen at the perceptron layer in case of both wireless sensor network and RFID Tag implication Layer. Both are a major part of the perceptron layer that consist a small part of the IoT. Some of the major attack vulnerabilities are exploited by executing the attacks through certain flaws in the protocol that are difficult to identify and almost complex to identify in complicated bigger protocols. As most of the sensors are resource constrained in terms of memory, battery power, processing power, bandwidth and due to which implementation of complex cryptosystem to keep the data being transferred secure is a challenging phase. The three main objectives studied in this scenario are setting up the system, registering user and the sensors via multiple gateways. Generating a common key which can be used for a particular interaction session among user, gateway and the sensor network. In this paper, we address one or more of these objectives for some of the fundamental problems in authentication and mutual authentication phase of the WSN in IoT deployment. We prevent the leakage of sensitive information using the rabin cryptosystem to avoid attacks like Man-in-the-middle attack, sensor session key leakage, all session hi-jacking attack and sniffing attacks in which data is analyzed maliciously by the adversary. We also compare and prove the security of our protocol using proverif protocol verifier tool.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.