The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ...The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.展开更多
Unaided authentication services provide the flexibility to login without being dependent on any additional device.The power of recording attack resilient unaided authentication services(RARUAS)is undeniable as,in some...Unaided authentication services provide the flexibility to login without being dependent on any additional device.The power of recording attack resilient unaided authentication services(RARUAS)is undeniable as,in some aspects,they are even capable of offering better security than the biometric based authentication systems.However,high login complexity of these RARUAS makes them far from usable in practice.The adopted information leakage control strategies have often been identified as the primary cause behind such high login complexities.Though recent proposals have made some significant efforts in designing a usable RARUAS by reducing its login complexity,most of them have failed to achieve the desired usability standard.In this paper,we have introduced a new notion of controlling the information leakage rate.By maintaining a good security standard,the introduced idea helps to reduce the login complexity of our proposed mechanism—named as Textual-Graphical Password-based Mechanism or TGPM,by a significant extent.Along with resisting the recording attack,TGPM also achieves a remarkable property of threat detection.To the best of our knowledge,TGPM is the first RARUAS,which can both prevent and detect the activities of the opportunistic recording attackers who can record the complete login activity of a genuine user for a few login sessions.Our study reveals that TGPM assures much higher session resiliency compared to the existing authentication services,having the same or even higher login complexities.Moreover,TGPM stores the password information in a distributed way and thus restricts the adversaries to learn the complete secret from a single compromised server.A thorough theoretical analysis has been performed to prove the strength of our proposal from both the security and usability perspectives.We have also conducted an experimental study to support the theoretical argument made on the usability standard of TGPM.展开更多
基金support of the Interdisciplinary Research Center for Intelligent Secure Systems(IRC-ISS)Internal Fund Grant#INSS2202.
文摘The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes.
文摘Unaided authentication services provide the flexibility to login without being dependent on any additional device.The power of recording attack resilient unaided authentication services(RARUAS)is undeniable as,in some aspects,they are even capable of offering better security than the biometric based authentication systems.However,high login complexity of these RARUAS makes them far from usable in practice.The adopted information leakage control strategies have often been identified as the primary cause behind such high login complexities.Though recent proposals have made some significant efforts in designing a usable RARUAS by reducing its login complexity,most of them have failed to achieve the desired usability standard.In this paper,we have introduced a new notion of controlling the information leakage rate.By maintaining a good security standard,the introduced idea helps to reduce the login complexity of our proposed mechanism—named as Textual-Graphical Password-based Mechanism or TGPM,by a significant extent.Along with resisting the recording attack,TGPM also achieves a remarkable property of threat detection.To the best of our knowledge,TGPM is the first RARUAS,which can both prevent and detect the activities of the opportunistic recording attackers who can record the complete login activity of a genuine user for a few login sessions.Our study reveals that TGPM assures much higher session resiliency compared to the existing authentication services,having the same or even higher login complexities.Moreover,TGPM stores the password information in a distributed way and thus restricts the adversaries to learn the complete secret from a single compromised server.A thorough theoretical analysis has been performed to prove the strength of our proposal from both the security and usability perspectives.We have also conducted an experimental study to support the theoretical argument made on the usability standard of TGPM.