Next Article in Journal
Gaze and Eye Tracking: Techniques and Applications in ADAS
Next Article in Special Issue
A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks
Previous Article in Journal
Novel Framework Based on HOSVD for Ski Goggles Defect Detection and Classification
Previous Article in Special Issue
Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment

1
Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248 002, India
2
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India
3
Virginia Modeling, Analysis and Simulation Center, Center for Cybersecurity Education and Research, Department of Computational Modeling and Simulation Engineering, Old Dominion University, Suffolk, VA 23435, USA
4
Federal University of Piauí (UFPI), 64049-550 Teresina-Pi, Brazil
5
Instituto de Telecomunicações, 1049-001 Lisbon, Portugal
6
School of Electronics Engineering, Kyungpook National University, Daegu 41566, Korea
*
Author to whom correspondence should be addressed.
Current address: School of Electronics Engineering, Kyungpook National University, 80 Daehak-ro, Sangyeok-dong, Buk-gu, Daegu 41566, Korea.
Sensors 2019, 19(24), 5539; https://doi.org/10.3390/s19245539
Submission received: 19 November 2019 / Revised: 9 December 2019 / Accepted: 11 December 2019 / Published: 14 December 2019
(This article belongs to the Special Issue Security and Privacy in Wireless Sensor Network)

Abstract

:
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT.

1. Introduction

The Internet of Things (IoT) is a network of physical objects (for example, smart devices) such as smart vehicles, smart industrial monitoring machines, smart home appliances, and many more. Such objects are connected together to gather, process, rectify, and exchange relevant data over the Internet [1,2,3,4,5,6]. Furthermore, smart devices along with application programming interfaces (APIs) are used to connect and exchange data over the Internet. Each physical object (i.e., smart lighting system) has a provided IP address, which makes it capable to communicate (i.e., sending and receiving) over the network without human involvement. The shortage of IPv4 addresses resulted in designing the “IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN)”, which has significantly changed the IoT in order to increase the use of IPv6 by smart, as well as small scale objects [7]. The IoT communication environment is used in various types of applications, such as “smart health care”, “smart traffic monitoring”, and “smart homes”, to name a few. Edge computing introduced a new concept of computing. It has already become popular in industry, as well as academic research communities. It empowers many future technologies (for example, 5G, vehicle-to-vehicle and vehicle-to-cloud communications, augmented reality) by putting the connection in between end users and the cloud computing model and services [8,9,10]. Edge computing brings the utilities and services of cloud computing, which results in the faster processing and quicker response time of applications. Edge computing facilities the produced data of smart devices in the IoT environment to be processed nearby the location where it was generated in place of sending it across long routes to the “cloud” or “data centers” [10,11,12]. Though the edge based IoT environment provides many advantages over the traditional computing environment, at the same time, it has also the following security and privacy issues:
  • The exchanged messages among different communicating parties (i.e., “IoT device”, “edge node”, and “cloud server”) should be protected against several known attacks (for example, “replay”, “man-in-the-middle”, “impersonation”, “offline or online password guessing”, and some other kinds of “bypassing attacks”).
  • The edge node receives and processes the data, which are sent by the IoT devices. After the required processing, the edge node sends the data to the cloud server(s) for further processing and storage. Sometimes, the sent data are very critical and important, and any kind of disclosure of the data creates big trouble. Therefore, we need strong secure privacy preservation techniques to protect the data in the edge based IoT environment.
  • As existing authentication protocols have security flaws that make them vulnerable to some known attacks (for example, “privileged insider attack”, “online and offline password guessing”, etc.), consequently, it becomes important to enhance the security of the authentication protocols, for instance in the case of “new device addition or revocation”, other communicating parties of the network should also be informed by the concerned (trusted) authority so that they can become aware about this activity and can update their memories accordingly [1,4]. Hence, it is an exigent task to provide a design for such a kind of protocol that supports “dynamic installation/update” without compromising the security of the system [4].
  • In the edge based IoT environment, there is a possibility that some IoT devices may be “physically stolen/captured” by the adversary ( A ) . After the physical capturing, A can use a “power analysis attack” [13] to obtain the data from the memory of the captured smart IoT devices. Later on, this drawn out information is used for other malicious works, such as deriving the “session key” among an IoT device and cloud server. A can replace the physical captured device with his/her own malicious device(s) that he/she has cloned in the laboratory. We should be more careful while going for the design of authentication and key management techniques in case some IoT devices are physically compromised so that there should not be any affect on the security of communication happening in the rest of the network [1,4].
As discussed earlier, the edge based IoT environment has several issues related to security and privacy. The existing authentication schemes have various “security flaws” that make them vulnerable to different known and unknown attacks. Some of them are not efficient from the computation and communication cost point of few. Hence, there is an essential requirement for a new “lightweight authentication and key management” scheme for the edge based IoT environment. Consequently, we design a new “lightweight authentication and key management” scheme for such an environment.

1.1. Contributions of LDAKM-EIoT

The contributions of this paper are many-fold in the following contexts:
  • We propose a new “lightweight authentication and key management” scheme for edge based IoT environment (LDAKM-EIoT). In LDAKM-EIoT, we use various efficient operations such as bitwise “exclusive-OR (XOR)” and “one way collision resistant cryptographic hash functions”.
  • LDAKM-EIoT is secure against different kinds of attacks by the help of “formal security verification” using the widely used AVISPA tool and also through other mathematical security analysis.
  • The detailed comparative investigation among related existing schemes and LDAKM-EIoT evidences that LDAKM-EIoT achieves more security and additional functionality features and LDAKM-EIoT has also less communication and computation costs as compared to the other related schemes.
  • The practical simulation study of LDAKM-EIoT is also executed with the help of the broadly used NS2 tool.

1.2. Paper Structure

The information about the “network model” and “threat model” of LDAKM-EIoT is discussed in Section 2. The brief discussion on the related existing authentication techniques is provided in Section 3. Different phases of LDAKM-EIoT are explained in Section 4. The security analysis of LDAKM-EIoT is conducted in Section 5. The formal security verification by the help of the AVISPA tool is done and explained in Section 6. The performance comparison among LDAKM-EIoT and other related existing authentication techniques is explained in Section 7. The impact of LDAKM-EIoT and other related schemes on network performance parameters is measured, analyzed, and then compared in Section 8 using the NS2 simulation. At last, the paper is concluded in Section 9.

2. Related Work

Wolf and Serpanos [14] explained different security issues of cyber-physical systems (CPS) and IoT systems. They discussed a security (safety) threat model for CPS and IoT systems. Ni et al. [15] explained the role of fog nodes in various IoT applications. After that, they examined several promising IoT applications as per these different roles.
Yeh et al. [16] demonstrated an “elliptic curve cryptography (ECC)” based user authentication mechanism for wireless sensor networks (WSNs). Their scheme did not achieve the mutual authentication property. To fix the problem of their scheme, Shi and Gong [17] proposed another improved “ECC based user authentication” scheme in WSNs. After that, Turkanovic et al. [18] came up with another user “authentication and key establishment” protocol for heterogeneous WSNs. Later on, their scheme was discovered to be insecure against “offline password guessing”, “offline identity guessing”, “smart card stolen”, “sensor node impersonation”, and “user impersonation” attacks. Moreover, their scheme did not support one of the essential properties, named as “mutual authentication” [19].
Khalil et al. [20] shed some light on the integration of WSNs in IoT. In the IoT environment, smart devices have limited computing and storage resources, like WSNs. It is also emphasized that some of the existing authentication techniques had serious security flaws as they were vulnerable to “impersonation”, “sensing node physical capture”, “replay”, “man-in-the-middle”, and “privileged insider” attacks [3,21].
Farash et al. [21] demonstrated a technique for “user authentication and key establishment” for heterogeneous WSNs, which can be applicable for IoT communication. Later on, Amin et al. [22] did cryptanalysis on the scheme of Farash et al. [21] and discovered that it was not secure against possible attacks such as “offline password guessing” by using the lost/stolen smart card, “session-specific temporary information leakage”, and “user impersonation” attacks. Furthermore, Amin et al. [22] proposed an improved version of their scheme to mitigate the security flaws of Farash et al.’s scheme [21]. Srinivas et al. [23] demonstrated that the scheme of Amin et al. [22] was insecure against “user impersonation”, “leakage of different keys”, “stolen smart card”, and “server spoofing” attacks. Srinivas et al. further presented an improved and enhanced version of their scheme for “user authentication” in multi-gateway WSNs applicable to the IoT environment. Jiang et al. [24] also discovered the security flaws in the scheme of Amin et al. [22] as it was not able to mitigate some attacks. To overcome these vulnerabilities in the scheme of Amin et al., Jiang et al. presented an improved scheme.
Hsieh and Leu [25] proposed a new technique to resolve the security weaknesses of the other schemes [26,27,28]. Later on, Wu et al. [29] performed crypto-analysis of Hsieh–Leu’s scheme and identified the vulnerabilities of their scheme as it was not secure against different attacks such as “offline guessing”, “user forgery”, “insider attack”, and “sensor node physical capturing”. In addition, their scheme was not secure against the session key security, and also, it did not provide the mutual authentication property. To resolve these problems, Wu et al. presented a new “user authentication” protocol for WSN, which was also applicable to IoT communication.
Li et al. [30] presented a device-to-device authentication protocol in the IoT environment. Their approach relied on public key techniques that needed public key encryption and decryption by the resource limited IoT smart devices. Though their approach maintained security, it demanded high communication and computation overheads from the IoT devices’ point of view.
Santos et al. [31] designed a “federated identity management (FIdM)” system in order to assist in improving privacy and user authentication in the IoT deployment, where an IoT device accesses services from a service provider. Their approach was lightweight as it required low computational cost due to symmetric cryptographic operations. They applied their proposal to a cashless toll system environment.
Gope and Sikdar [32] designed a “lightweight and privacy preserving two factor authentication” scheme in which physical security was included. In their proposal, an IoT device and a server mutually authenticated each other for accessing services in the IoT environment. However, their scheme needed more computational cost due to fuzzy extractor generation and reproduction functions [33].
In order to design an access control and security policy, Han and Kim [34] designed a mutual authentication scheme between IoT devices. Though their scheme was lightweight due to symmetric cryptographic operations, it did not preserve device anonymity and untraceability properties.
Group key management (GKM) is considered as another important security aspect in the IoT environment, which helps with assigning IoT devices into predefined groups in the network. After that, key management is essential within each group and also among various groups in order to improve efficiency and security in the IoT environment. For this issue, Kung and Hsiao [35] designed an efficient GKM policy in an IoT deployment. Their approach also permitted joining and leaving the devices in a group dynamically in the IoT environment. Their approach was lightweight as it relied on the “cryptographic hash function” and symmetric cryptographic operations.
Raza and Magnusson [36] pointed out that “unanimous consensus” is extremely essential in the IoT environment for cyber security purposes. They presented a lightweight adaptation of the “Internet Key Exchange Version 2 (IKEv2)” for the IoT deployment, called TinyIKE. With the help of TinyIKE, they were able to solve the key management issue for several IoT protocols by applying a single IKEv2 based approach. TinyIKE relies on certificates, elliptic curve cryptographic techniques, as well as symmetric cryptographic techniques.
Challa et al. [3] recommended an ECC based user authentication protocol for IoT applications that can be used in the coming future. However, Jia et al. [37] highlighted that Challa et al.’s method did not protect against impersonation attack and also it did not preserve the untraceability property. Moreover, Challa et al.’s scheme [3] was expensive in computation and communication. Recently, Malani et al. [38] presented a “certificate based device access control” scheme applied to IoT communication to mitigate the security problems and limitations of the existing authentication and access control protocols. Their scheme the preserved anonymity property.
Sharma and Kalra [39] proposed a lightweight user authentication protocol that can be applied to healthcare services in the cloud-IoT environment. However, their scheme was insecure against privileged-insider attack during the registration of medical professional, where the password of the medical professional was easily guessed by an attacker with the help of stolen smart card attack and registered information supplied by the medical professional to the gateway node. Moreover, their scheme did not provide the sensor node anonymity property and session key security under the Canetti and Krawczyk (CK) adversary model [40] (discussed in the threat model in Section 3.2). Zhou et al. [41] designed an authentication protocol that utilized IoT based architectures combined with cloud servers. Though their scheme was lightweight in nature, Martinez-Pelaez et al. [42] pointed out that Zhou et al.’s scheme [41] was vulnerable to various attacks, such as privileged-insider attack, man-in-the-middle attack, replay attack, and user impersonation attack. Furthermore, Martinez-Pelaez et al. also showed that Zhou et al.’s scheme failed to provide mutual authentication and secret key protection. To mitigate the security limitations mentioned in Zhou et al.’s scheme, Martinez-Pelaez et al. proposed an efficient authentication scheme.
As discussed above, most of the available methods for “authentication and key agreement” for communication in IoT and WSNs are insecure against different types of attacks. In addition, some of these techniques use heavy weight operations as they require more communication and computing resources. As a result, these existing techniques demonstrated for the “IoT environment” may not be much suitable for the authentication procedure in the edge based IoT environment. Consequently, we perceive that there is a requirement for a secure “authentication and key management” mechanism for the edge based IoT environment that should be lightweight. To fulfill this goal, we propose a new “lightweight authentication and key management” scheme for the edge based IoT environment that utilizes only an efficient “one way cryptographic hash” function and “bitwise X O R ” operation.

3. System Models

The following two models are utilized to describe the working and usability of LDAKM-EIoT.

3.1. Network Model

The network model of LDAKM-EIoT is presented in Figure 1. In this figure, we have IoT devices, an edge node, which is a gateway to the Internet, the cloud server(s), and a trusted authority (TA). IoT devices can be deployed as per their applications (for example, smart health care, smart manufacturing, smart cities, and smart homes). The task of each IoT device is to collect and process information about some activity (i.e., level of fumes in a industrial plant) and then to send the data to the cloud server(s) through the edge node. At the cloud server, this will be stored and utilized for other processing and decision making tasks. In this model, IoT devices are resource constrained, whereas the edge node and cloud server are resource rich as they are able to do intensive computations and have more storage capacity and battery backup. The T A is responsible for the registration of different devices (i.e., IoT devices, edge nodes, and cloud servers). In such a kind of communication environment, we have to secure the communication between the IoT device and edge node and the edge node and cloud server. Since most of IoT devices are resource constrained, we preferred to use lightweight cryptographic operations (i.e., hash and XOR operations) in different exchanged messages’ computation. Consequently, to secure such kinds of communication, we urge a new “authentication and key management” protocol with lightweight operations. Using this scheme, the communicating entities can securely access the resources of other entities and also communicate securely.

3.2. Threat Model

The widely accepted “Dolev–Yao (DY) threat model” [43] was followed in the designing of LDAKM-EIoT. As per the guidelines of the DY model, two communicating entities communicate over an open (insecure) channel. The end-point entities such as “IoT devices” are not fully trusted in general. The existing network adversary ( A ) can eavesdrop, update, or delete the communicated messages as the channel is insecure. We also followed Canetti and Krawczyk’s adversary model, also named as the “CK adversary model” [40], which is the current de facto standard model in the designing and modeling of an “authenticated key agreement” security scheme. In the CK adversary model, A can have all the capabilities like the DY model. In addition to that, A can also compromise the secret credentials along with the “session states and session keys” during a session. Moreover, A can physical capture some IoT devices and extract the stored information from the IoT devices by the application of a sophisticated power analysis attack [13]. The obtained credentials can be further used to perform other kinds of malicious activities, such as the computation of “secret credentials” and the “session key”, and launch some attacks, such as “IoT device impersonation”, “replay”, “privileged-insider”, and “man-in-the-middle”. As per the information available in [44], we also assumed that the edge node ( E N ) was fully trusted and could not be compromised by A . Otherwise, if the E N was compromised, the entire network would be compromised. For such a purpose, we followed the method discussed by Bertino et al.’s protocol [45]. We assumed that the E N was equipped with a tamper resistant hardware device so that all the sensitive confidential information (for example, stored cryptographic keys) should be protected from A . Therefore, the application of a tamper resistant E N attained strong enough security in LDAKM-EIoT. Though it is also true that the attacks are possible on tamper resistant devices, A needs special equipment (device) to perform such an attack to acquire the stored information. This is because it is less expensive to install the E N than to use special equipment because A does not have any economic benefits to perform such an attack on a security scheme [45]. Moreover, we could secure the E N by putting it inside a physical locking system so that the physical capture of the E N will be difficult for A as compared to that for the unattended IoT smart devices. In addition, the “trusted authority ( T A ) ” was also assumed to be a “fully trusted” entity of the network and that it would not be compromised, although the “cloud servers” were considered to be “semi-trusted” entities.

4. The Proposed Scheme: LDAKM-EIoT

In this section, we talk about the precise workings of the proposed scheme, called the “lightweight authenticated key management mechanism for the edge-based IoT environment (LDAKM-EIoT)”. The distinct phases of LDAKM-EIoT are provided in the upcoming part of the paper. It was also assumed that the different network entities (i.e., IoT device, edge node, cloud server) were synchronized with their clocks. It is mandatory to have this assumption while we go for the designing of an authentication mechanism for different networks [1,2,3,46,47,48]. We needed different notations for the designing of LDAKM-EIoT, which we summarize in Table 1 along with their significance.

4.1. Pre-Deployment Phase

This phase permitted the trusted authority ( T A ) , a fully trusted entity in the network, to perform the registration of IoT devices, edge nodes, and cloud servers before they were installed in the deployment area. We assumed that n d number of IoT devices D i were associated with a particular edge node E N , and the real-time information could be accessed from the IoT devices to n c number of cloud servers C S j , provided that a mutual authentication and key establishment happened successfully among the IoT devices and cloud servers with the presence of the edge node E N .

4.1.1. Registration of IoT Devices

The T A firsts picked a distinct unique identity I D D i for every IoT device D i and computed its corresponding pseudo identity as R I D D i = h ( n | | I D D i ) , temporal credentials T C D i = h ( R I D D i | | I D E N | | I D T A | | n | | R T S D i ) , A D i = h ( K E N D i | | I D D i | | I D E N | | R T S D i ) where R T S D i is the registration timestamp for D i , K E N D i is a 1024 bit shared secret key between each IoT device D i and edge nodes generated by the T A , where i = 1 , 2 , n d , and n d is the total count of IoT devices. Moreover, I D E N is the identity of an edge node E N where the IoT devices need to authenticate a cloud server C S j with an IoT device D i . I D T A is the identity of T A , and n is a 160 bit secret number of T A that is only disclosed to the T A . After that, T A generates a temporary identity T I D D i for each D i . Note that temporal credentials are different for each IoT device D i , which protects against various attacks including impersonation attack, in case any IoT device is physically compromised by an attacker. Lastly, the trusted authority stores the credentials { R I D D i , T I D D i , T C D i , A D i , h ( · ) } in the memory of D i prior to its placement in the IoT network.

4.1.2. Registration of Cloud Servers

The T A picks a distinct unique identity I D C S j for each cloud server C S j and proceeds to calculate its pseudo identity as R I D C S j = h ( n | | I D C S j ) and A C S j = h ( K E N C S j | | I D C S j | | I D E N | | R T S C S j ) where R T S C S j is the registration timestamp for C S j and j = 1 , 2 , n c , n c are the number of cloud servers placed initially in the IoT network, while K E N C S j is a 1024 bit shared secret key of the edge node and cloud server C S j generated by the T A . Next, the T A stores the credentials { R I D C S j , A C S j , I D C S j , h ( · ) } in the database of C S j before its placement in the network.

4.1.3. Registration of Edge Node

The T A picks a distinct unique identity I D E N for edge node E N and stores previously computed information, as well as this information, that is { ( T I D D i , R I D D i , I D D i , T C D i , A D i ) | 1 i n d } , { ( I D C S j , R I D C S j , A C S j ) | 1 j n c } , h ( · ) , in the database of E N before its placement in the network.
The registration process is summarized in Figure 2.

4.2. Authentication and Key Agreement Phase

The key management procedure helps to secure the authentication and key management among IoT devices and cloud servers by the involvement of a trusted edge node. The upcoming steps are essential to achieve this goal.
A1. 
When an IoT device, say D i , wants to initiate secure data transmission to a cloud server, first of all, D i needs to compute the following parameters. D i picks a random nonce r d i and current timestamp T 1 and calculates M 1 = h ( A D i | | T 1 ) r d i and M 2 = h ( A D i | | T 1 | | T I D D i | | R I D D i | | T C D i | | r d i ) . Next, D i sends the message M s g 1 = { T I D D i , M 1 , M 2 , T 1 } to the edge node E N via an open channel.
A2. 
After the arrival of message M s g 1 at time T 1 * , the E N checks the timeliness of T 1 with the verifying condition | T 1 T 1 * | Δ T . If it is valid, the E N fetches R I D D i , T C D i , A D i , and I D D i corresponding to received T I D D i and computes r d i = M 1 h ( A D i | | T 1 ) , M 2 = h ( A D i | | T 1 | | T I D D i | | R I D D i | | T C D i | | r d i ) and checks whether M 2 = M 2 . If it is valid, D i is authenticated by the E N and can access its resources to get access to a cloud server C S j selected by the E N . Next, the E N chooses a random nonce r e n 1 and current timestamp T 2 , picks A C S j from its database corresponding to I D C S j , and computes T I D D i = T I D D i h ( A C S j | | T 2 ) , M 3 = h ( A C S j | | R I D C S j ) h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) and M 4 = h ( T I D D i | | T 2 | | R I D C S j | | A C S j | | h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) ) . After that, the E N sends the message M s g 2 = { T I D D i , M 3 , M 4 , T 2 } to C S j via an open channel.
A3. 
After the arrival of message M s g 2 at time T 2 * , C S j verifies the timeliness of T 2 by checking if | T 2 T 2 * | Δ T is valid. After successful verification of T 2 , C S j computes T I D D i = T I D D i h ( A C S j | | T 2 ) , h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) = M 3 h ( A C S j | | R I D C S j ) and M 4 = h ( T I D D i | | T 2 | | R I D C S j | | A C S j | | h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) ) . After that, C S j checks whether M 4 = M 4 is satisfied. If it is valid, the E N is authenticated by C S j . Otherwise, C S j halts the session with the E N immediately. Furthermore, C S j picks up a random nonce r c s j and current timestamp T 3 and computes M 5 = r c s j h ( T 2 | | A C S j | | R I D C S j ) . Then, C S j computes the session key shared with D i as S K C S j D i = h ( T I D D i | | T 3 | | h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) | | h ( r C S j | | A C S j | | I D C S j | | T 3 ) ) , M 6 = h ( S K C S j D i | | T 3 ) , and M 7 = h ( r c s j | | T 2 | | T 3 | | A C S j | | R I D C S j ) . After computing these values, C S j sends the message M s g 3 = { M 5 , M 6 , M 7 , T 3 } to the E N via an open channel.
A4. 
After arrival of message M s g 3 at time T 3 * , the E N verifies the timeliness of T 3 by checking if | T 3 T 3 * | Δ T is valid. Upon successful validation of T 3 , the E N calculates r c s j = M 5 h ( T 2 | | A C S j | | R I D C S j ) and M 7 = h ( r c s j | | T 2 | | T 3 | | A C S j | | R I D C S j ) . Next, the E N checks whether M 7 = M 7 , and if it holds, C S j is authenticated by the E N . Otherwise, the E N halts the session with C S j instantly. Furthermore, the E N selects a random nonce r e n 2 along with current timestamp T 4 and computes M 8 = h ( A D i | | T C D i ) h ( r e n 2 | | T 4 ) , α = h ( R I D D i | | T C D i | | T 4 ) h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) , β = h ( r C S j | | A C S j | | I D C S j | | T 3 ) h ( h ( r e n 2 | | T 4 ) ) | | A D i | | T C D i ) and M 9 = h ( M 6 | | M 8 | | h ( r e n 2 | | T 4 ) | | T 3 | | T 4 ) . After computing these values, the E N picks a new temporary identity T I D D i n e w for D i and calculates M 10 = h ( M 9 | | T 3 | | T 4 | | A D i | | T C D i | | T I D D i ) T I D D i n e w . The E N also replaces T I D D i with T I D D i n e w in its database. Finally, the E N sends the message M s g 4 = { M 8 , α , β , M 9 , M 10 , T 3 , T 4 } to E N via an open channel.
A5. 
After arrival of message M s g 4 at time T 4 * , D i verifies the timeliness of T 4 by checking if | T 4 T 4 * | Δ T is valid. After successful validation of T 4 , D i calculates h ( r e n 2 | | T 4 ) = M 8 h ( A D i | | T C D i ) , h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) = α h ( R I D D i | | T C D i | | T 4 ) , h ( r C S j | | A C S j | | I D C S j | | T 3 ) = β h ( h ( r e n 2 | | T 4 ) ) | | A D i | | T C D i ) , the shared session key with C S j as S K D i C S j = h ( T I D D i | | T 3 | | h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) | | h ( r C S j | | A C S j | | I D C S j | | T 3 ) ) . In addition, D i also calculates M 6 = h ( S K D i C S j | | T 3 ) and M 9 = h ( M 6 | | M 8 | | h ( r e n 2 | | T 4 ) | | T 3 | | T 4 ) . Then, D i checks whether M 9 = M 9 , and if it is legitimate, the E N , as well as C S j are authenticated by D i , and the computed session key is treated as the valid one. Thus, both D i and C S j will maintain the same computed shared session key S K D i C S j ( = S K C S j D i ) for secret communications. Moreover, D i calculates the new temporary identity as T I D D i n e w = M 10 h ( M 9 | | T 3 | | T 4 | | A D i | | T C D i | | T I D D i ) and will use this new identity in all its future communications with the E N and C S j . It is worth noticing that the new temporary identity generation mechanism makes the proposed scheme prevent the traceability attack.
Finally, the above phase is abridged in Figure 3.
Remark 1
(Protection for synchronization attack). We may consider a situation where the message Msg 4 has been tampered with or there is a communication error that occurs so that an IoT device cannot receive the parameter M 10 , as well as the new temporary identity T I D D i n e w . In order to resolve this problem, we contemplated a possible solution suggested in [49], where an IoT device needs to maintain a set of l shadow identities SID = { sid 1 , sid 2 , , sid l }. In this context, when an IoT device, say D i , could not receive the message M s g 4 within a specific time period (maximum round-trip time), it needs to select one of the unused shadow identities, say sid j SID , and then send it within the message M s g 1 . When the E N receives the sid j , it can generate a new TIDand send it securely to the device D i . By using this method, we can address the synchronization attacks without compromising the privacy of an IoT device in the proposed scheme (LDAKM-EIoT).

4.3. Dynamic Node Addition Phase

There is the chance that some of the IoT devices fail to work properly or might stop their working completely. Furthermore, there is the possibility that some of the IoT devices can be “physically stolen (capture)” by an adversary A . In order to draw out the useful data from the stolen IoT devices (i.e., session key, temporary and pseudo identities, and other credentials stored in their memory), henceforth, it becomes very important to add new IoT devices in the required area. LDAKM-EIoT provides a facility for the addition of new IoT devices and also cloud servers in the network at any time after initial installment.

4.3.1. Dynamic IoT Device Addition

The upcoming procedure is needed to add a new IoT device, say D n i , in the required part of the IoT environment.
DD1. The T A picks a new unique identity I D D n i for the new IoT device D n i and computes its corresponding pseudo identity as R I D D n i = h ( n | | I D D n i ) , temporal credentials T C D n i = h ( R I D D n i | | I D E N | | I D T A | | n | | R T S D n i ) , A D n i = h ( K E N D n i | | I D D n i | | I D E N | | R T S D n i ) where R T S D n i is registration timestamp generated for D n i and K E N D n i is the shared secret key between IoT device D n i and the edge node E N generated by the T A . T A also generates a unique temporary identity T I D D n i for D n i that is different from the previously deployed IoT devices.
DD2. The T A stores the credentials { R I D D n i , T I D D n i , T C D n i , A D n i , h ( · ) } in the memory of D n i before its placement in the deployment area. Furthermore, the T A securely sends the information { R I D D n i , T I D D n i , T C D n i , A D n i } related to D n i to E N so that the E N can update these information in its database corresponding to the newly added IoT device D n i . Note that for secure communication between T A and E N , a pre-shared symmetric key among them is essential, and it is generated by the T A prior to the placement of the E N .

4.3.2. Dynamic Cloud Server Addition

The upcoming procedure is required to add a new cloud server, say C S n j , in the required part of the IoT environment.
DC1. The T A chooses a distinct unique identity I D C S n j for C S n j and computes its pseudo identity as R I D C S n j = h ( n | | I D C S n j ) and A C S n j = h ( K E N C S n j | | I D C S n j | | I D E N | | R T S C S n j ) where R T S C S n j is the registration timestamp for C S n j . Moreover, K E N C S n j is the shared secret key of the edge node E N and cloud server C S n j generated by the T A .
DC2. The T A then stores the credentials { R I D C S n j , A C S n j , I D C S n j , h ( · ) } into the database of C S n j prior to its deployment in the IoT environment.

5. Security Analysis of LDAKM-EIoT

In this section, we provide the security analysis of LDAKM-EIoT in Propositions 1–7, which prove its robustness against the following possible attacks.
Proposition 1.
LDAKM-EIoT is resilient against replay attack.
Proof. 
In LDAKM-EIoT, we utilized various current timestamp values for the communicating entities ( D i , E N , and C S j ). In the each exchanged message of LDAKM-EIoT, we used the maximum transmission delay Δ T factor, which is a small value. Consequently, an adversary A can not gain any advantage in replaying the old transmitted messages, which are used in the authentication and key management procedure among D i , E N , and C S j within Δ T . Thus, LDAKM-EIoT is secure against replay attack. □
Proposition 2.
LDAKM-EIoT is resilient against man-in-the-middle attack (MITM).
Proof. 
Suppose an adversary A seizes an authentication request message { T I D D i , M 1 , M 2 , T 1 } exchanged between D i and E N and further tries to update this message in such a way that it looks similar to a genuine authentication message, as { T I D D i a , M 1 a , M 2 a , T 1 a } by using the parameters such as M 1 a = A D i r d i a and M 2 a = h ( A D i | | T 1 a | | T I D D i a | | R I D D i | | T C D i | | r d i ) . The values of the used variables are R I D D i = h ( n | | I D D i ) , T C D i = h ( R I D D i | | I D E N | | I D T A | | n | | R T S D i ) , A D i = h ( K E N D i | | I D D i | | I D E N | | R T S D i ) where R T S D i is the registration timestamp for D i and K E N D i is the shared secret key of IoT device and edge node generated by the T A . To launch this attack, A can initiate the generation of random nonce r d i a and current timestamp T 1 a . However, without obtaining the information about “long term secret” R I D D i , I D E N , I D T A , n, and K E N D i , A cannot re-create another valid authentication request message { T I D D i a , M 1 a , M 2 a , T 1 a } . By using a similar approach, we can also explain that other messages cannot be recomputed by A , which are used in the “authentication and key management” phase without the “long term secrets” used by D i , E N , and C S j . This proves the resilience of LDAKM-EIoT against MITM. □
Proposition 3.
LDAKM-EIoT provides protection against different impersonation attacks.
Proof. 
Suppose an adversary A attempts to create a valid authentication request message on behalf of a communicating party (for example, D i ) after obtaining D i ’s authentication request M s g 1 = { T I D D i , M 1 , M 2 , T 1 } sent towards the E N by D i , where M 1 = A D i r d i and M 2 = h ( A D i | | T 1 | | T I D D i | | R I D D i | | T C D i | | r d i ) . The values of the used variables are R I D D i = h ( n | | I D D i ) , T C D i = h ( R I D D i | | I D E N | | I D T A | | n | | R T S D i ) , and A D i = h ( K E N D i | | I D D i | | I D E N | | R T S D i ) where R T S D i is the registration timestamp for D i and K E N D i is the shared secret key of IoT device and edge node generated by the T A . Note that M s g 1 uses M 1 and M 2 , which are computed using the “long term secrets”( R I D D i , I D E N , I D T A , n, K E N D i ) and also the “short term secrets” (random nonce r d i ). Without knowing these secret values, A is not able to create a valid authentication request message on behalf of the genuine IoT device D i . Hence, we can say that LDAKM-EIoT is resilient against IoT device impersonation attack. In the same way, it can also be proven that LDAKM-EIoT provides protection against edge node and cloud server impersonation attacks as the creation of other messages M s g 2 , M s g 3 , and M s g 4 employs both “long term” and “short term” secrets. Therefore, LDAKM-EIoT is secure against impersonation attacks. □
Proposition 4.
LDAKM-EIoT protects Ephemeral secret leakage (ESL) attack.
Proof. 
In LDAKM-EIoT, the session key is computed by a genuine cloud server C S j and the accessed D i during the the authentication and key management phase as S K C S j D i = h ( T I D D i | | T 3 | | h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) | | h ( r C S j | | A C S j | | I D C S j | | T 3 ) ) . Here, A D i = h ( K E N D i | | I D D i | | I D E N | | R T S D i ) where K E N D i is the shared secret key of the IoT device and edge node generated by the T A and K E N C S i is the shared secret key of the E N and cloud server generated by the T A . Further, the identities of the IoT device, I D D i , the identity of the edge node I D E N , and the identity of the cloud server I D C S j are also utilized. It is understandable that the “session key” is the combination of both the session temporary (ephemeral) information, also called “short term secrets” (different random nonces and timestamps), as well as the “long term secrets” (different secret keys and identities). Thus, the session key can only be disclosed if A compromises both the session temporary and long term secrets. Moreover, as different random nonces and timestamps are used in the computation of the session keys between D i and C S j in distinct sessions, even if a session key is disclosed for a specific session, it will not result in computing the session keys of other sessions because of the combination of short and long term secrets. Thus, LDAKM-EIoT provides protection against session temporary information attack, and it also preserves the “perfect forward secrecy” goal. Therefore, LDAKM-EIoT is resilient against “ESL attack”. Consequently, LDAKM-EIoT preserves the session key security under the “CK adversary model” [40]. □
Proposition 5.
LDAKM-EIoT is resilient against privileged-insider attack.
Proof. 
The privileged-insider user of a cloud server, say A , knows the registration information { R I D C S j , A C S j , I D C S j , h ( · ) }. However, he/she cannot calculate the “session key” on behalf of the cloud server as the session key utilizes the credentials that are only known to the IoT devices or the edge node. The “session key” calculated by the legitimate cloud server is S K C S j D i = h ( T I D D i | | T 3 | | h ( r e n 1 | | T 1 | | A D i | | I D D i | | r d i | | T C D i ) | | h ( r C S j | | A C S j | | I D C S j | | T 3 ) ) . Moreover, r e n 1 is the random nonce of the E N . The identities of the IoT device, I D D i , the identity of the edge node I D E N , and identity of the cloud server I D C S j are also utilized in S K C S j D i . The privileged-insider user of the cloud server does not have any information about I D D i , I D E N , and K E N D i . Therefore, A cannot calculate the “session key” on behalf of the cloud server, as well as he/she cannot impersonate the cloud server, as explained in Proposition 3. Hence, LDAKM-EIoT is resilient against “privileged-insider attack”. □
Proposition 6.
LDAKM-EIoT preserves the anonymity and untraceability properties.
Proof. 
Let us assume an adversary A intercepts the messages M s g 1 = { T I D D i , M 1 , M 2 , T 1 } , M s g 2 = { T I D D i , M 3 , M 4 , T 2 } , M s g 3 = { M 5 , M 6 , M 7 , T 3 } , and M s g 4 = { M 8 , α , β , M 9 , M 10 , T 3 , T 4 } during the “authentication and key management phase” between D i and C S j via the E N . We used random nonces and current timestamps in the construction of messages, which helped to generate dynamic and unique messages for different sessions. Moreover, the identities I D D i , I D E N , and I D C S j are not transmitted in the plaintext format during transmission. This helps to attain both the anonymity and untraceability objectives of LDAKM-EIoT. □
Proposition 7.
LDAKM-EIoT provides protection against IoT device physical capture attack.
Proof. 
Each IoT device stores the credentials { R I D D i , T I D D i , T C D i , A D i , h ( · ) }, which are used for the “authentication and key management” purposes with other network communicating entities. The protection against IoT device physical capture attack is a very essential security requirement [50,51]. Suppose n c IoT devices are physically captured by an adversary A . We assess the IoT device physical capture attack as the fraction of total secure communications that are compromised from the capturing of n c IoT devices not including the communication in which the “compromised IoT devices” are straightforwardly extended. For example, one can estimate the probability of A ’s ability to decrypt the secure communication between a cloud server C S j and a non-compromised IoT device D i when n c IoT devices are already physically stolen and compromised. Suppose this probability is represented by P e ( n c ) . If P e ( n c ) = 0 , an “authentication and key management” protocol is termed as “unconditionally secure against IoT device physical capture attack”. From a captured IoT device D i , A will have the extracted credentials { R I D D i , T I D D i , T C D i , A D i , h ( · ) } along with the secret pairwise session key S K C S j D i shared between D i and C S j from its memory. However, it is very important to notice that all R I D D i , T I D D i , T C D i , A D i , R T S D i , and K E N D i are distinct for all installed IoT devices. Thus, the stolen D i by A can only help to find the secret keys between that D i and C S j . Furthermore, this results in all other secret keys between that C S j and other non-compromised IoT devices D i to be not still revealed. Therefore, compromising an IoT device will not cause the compromise of the entire communication, and we get the secure communications among the cloud server and other non-compromised IoT devices. This means that LDAKM-EIoT is unconditionally secure against IoT device physical capture attack. □

6. Formal Security Verification Using AVISPA

This section shows the resilience of the proposed scheme (LDAKM-EIoT) against replay and man-in-the-middle attacks based on the formal security verification. We applied the broadly-accepted “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool [52] to achieve this goal. There are four backends, namely “on-the-fly mode-checker (OFMC)”, “constraint-logic based attack searcher (CL-AtSe)”, “SAT (Boolean satisfiability problem) based model checker (SATMC)”, and “tree automata based on automatic approximations for the analysis of security protocols (TA4SP)”, which are integrated with the AVISPA tool. These backends help in automatic execution analysis of the security protocols. The “High-Level Protocol Specification Language (HLPSL)” helps in converting the high level implementation of the the security protocols into the “Intermediate Format (IF)” using the HLPSl2IF translator. HLPSL defines the roles for all the involved participating entities in a protocol, which are termed as the basic roles. The compulsory roles, known as “session” and “goal and environment”, consist of the composition of the sessions along with globally defined constants, respectively. The IF is provided as input to one of the four backends to produce the “Output Format (OF)”, which explicitly explains under what conditions the protocol becomes “safe”, “unsafe”, or “inconclusive”. The precise discussion on AVISPA and its HLPSL is available in [52]. The AVISPA tool is one of the widely used formal security verification tools. Researchers working in the authentication domain frequently use this software tool to validate the security of authentication protocols [1,2,3,46,48,53].
In our implementation of the proposed scheme (LDAKM-EIoT) under HLPSL, we defined four basic roles: (a) the role for the T A , (b) the role for an IoT device D i , (c) the role for the edge node E N , and (d) the role for a cloud server C S j . Apart from these basic roles, we had two compulsory roles (“session” and “goal and environment”). We applied the “SPAN (Security Protocol ANimator for AVISPA)” [54] for simulating LDAKM-EIoT. The backends that we covered were OFMC and CL-AtSe, because they support the bitwise XOR operation. Therefore, we excluded the simulation results under other backends (i.e., SATMC and TA4SP) from the simulation part, because they did not currently support XOR operation, and the results would be under these backends “inconclusive”. Figure 4 shows the simulation results under the OFMC and CL-AtSe backends. The summary of these backends helped us to predict the security of a designed scheme against replay and man-in-the-middle attacks. Under the OFMC backend, the simulation took 1019 milliseconds, while traversing 129 visited nodes at a depth of 20 plies. On the other hand, under the CL-Atse backend, 256 states were analyzed, and out of those states, 124 states were reachable with 0.58 s of translation time and 0.05 s of computation. The provided simulation results assured that LDAKM-EIoT was safe against the replay and man-in-the-middle attacks.

7. Comparative Analysis with Existing Schemes

In this section, the comparative study of LDAKM-EIoT with other related existing schemes, such as the schemes designed by Challa et al. [3], Farash et al. [21], Sharma and Kalra [39], Zhou et al. [41], and Turkanovic et al. [18], is done. It is worth noting that the schemes of Challa et al. [3], Farash et al. [21], Sharma and Kalra [39], Zhou et al. [41], and Turkanovic et al. [18] were designed for the IoT environment.

7.1. Comparative Study of Communication Costs

We took the identity, random nonce, hash digest (if the secure hash algorithm (SHA-1) [55] was utilized), and timestamp as 160, 128, 160, and 32 bits, respectively. It well known that the 1024 bit “RSA public key cryptosystem” maintains the same security level as that for the 160 bit “elliptic curve cryptography (ECC) cryptosystem” [56]. Thus, an elliptic curve point of the form P = ( P x , P y ) took ( 160 + 160 ) = 320 bits. The communication costs of LDAKM-EIoT and other schemes are provided in Table 2. In LDAKM-EIoT, the messages M s g 1 = { T I D D i , M 1 , M 2 , T 1 } , M s g 2 = { T I D D i , M 3 , M 4 , T 2 } , M s g 3 = { M 5 , M 6 , M 7 , T 3 } , and M s g 4 = { M 8 , α , β , M 9 , M 10 , T 3 , T 4 } incurred the costs of ( 160 + 160 + 160 + 32 ) = 512 bits, ( 160 + 160 + 160 + 32 ) = 512 bits, ( 160 + 160 + 160 + 32 ) = 512 bits, and ( 160 + 160 + 160 + 160 + 160 + 32 + 32 ) = 864 bits, respectively, and hence, all the messages needed a total of ( 512 + 512 + 512 + 864 ) = 2400 bits. On the other side, the communication costs for the schemes of Challa et al. [3], Farash et al. [21], Sharma and Kalra [39], Zhou et al. [41], and Turkanovic et al. [18] were 2528, 2752, 2912, 3840, and 2720 bits, respectively. It is depicted in Table 2 that LDAKM-EIoT performed better in terms of communication cost as compared to other considered existing schemes of Challa et al. [3], Farash et al. [21], Sharma and Kalra [39], Zhou et al. [41], and Turkanovic et al. [18].

7.2. Comparative Study of Computation Costs

The notations T e c m , T f e , and T h are used to represent the time required for an “ECC point multiplication”, a “fuzzy extractor function” for biometric verification in the case of the scheme designed by Challa et al. [3], and a “one way hash function”, respectively. Based on the experimental results available in [57], we took T h 0 . 00032 s, T e c m 0 . 0171 s, and T f e T e c m , that is T f e 0 . 0171 s. The computation costs’ comparison among LDAKM-EIoT and other schemes is depicted in Table 3. In LDAKM-EIoT, during the authentication and key agreement procedure, D i , E N , and C S j incurred 9 T h 2 . 88 ms, 15 T h 4 . 8 ms, and 8 T h 2 . 56 ms, respectively. The comparative results demonstrated that LDAKM-EIoT performed better than Challa et al.’s scheme [3] and Zhou et al.’s scheme [41]. Moreover, LDAKM-EIoT needed the same computation cost as compared to that for Farash et al.’s scheme [21]. However, LDAKM-EIoT required more computation cost as compared to that for Sharma and Kalra’s scheme [39] and Turkanovic et al.’s scheme [18]. However, this was accepted as LDAKM-EIoT provided extra security and functionality features as compared to those for the other compared schemes of Challa et al. [3], Farash et al. [21], Sharma and Kalra [39], Zhou et al. [41], and Turkanovic et al. [18] (see Table 4).

7.3. Comparative Study of Security and Functionality Attributes

The comparison of the security and functionality attributes for the proposed LDAKM-EIoT and other related schemes is shown in Table 4. Various features ( F S F 1 - F S F 4 , F S F 6 , F S F 17 , and F S F 18 ) were not supported/available in the scheme of Farash et al. [21], whereas Challa et al.’s scheme [3] did not support the features F S F 11 and F S F 14 , which were shown by Jia et al. [37]. Moreover, other schemes, such as the schemes of Sharma and Kalra [39], Zhou et al. [41], and Turkanovic et al. [18] did not provide the required functionality and security features. On the other hand, LDAKM-EIoT provided better security and functionality features as compared to other related schemes.

8. NS2 Simulation Study

In this section, we conduct the simulation study on LDAKM-EIoT and other existing related schemes of Challa et al. [3], Farash et al. [21], Sharma and Kalra [39], Zhou et al. [41], and Turkanovic et al. [18] using the NS2 simulator. The impact of LDAKM-EIoT and other related schemes is studied and compared on important network performance parameters (for example, throughput (available in bits per second (bps)) and end-to-end delay (available in seconds)).

8.1. Simulation Parameters

The specifics of the network parameters used in the NS2 simulation are given in Table 5. The simulation time was 30 min (1800 s). S j and C S j respectively represent the jth sensor node and cloud server, whereas U i / D i represents the ith user/IoT smart device respectively in LDAKM-EIoT and other schemes [3,21]. Moreover, we took one gateway node ( G W ) /edge node ( E N ) in all the compared schemes. The communication range of smart device or sensor was taken as 100 m. The messages exchanged among different communicating entities along with their communication costs (in bits) for different schemes are depicted in Table 6, which were used in the simulation for exchanging the packets (messages) among the entities. We applied the ad hoc on-demand distance vector (AODV) [58] as the routing protocol. All other parameters used in the simulation were taken as standard ones.

8.2. Comparative Analysis of the Simulation Results

The comparative analysis of the network performance parameters for LDAKM-EIoT, Challa et al. [3], and Farash et al. [21] is discussed in the following.

8.2.1. Comparative Analysis of the Network Throughput

The network throughput can be calculated as “the number of bits transmitted per unit time, and it can be mathematically expressed as ( ν r × | ρ | ) / T d , where T d is the total time (in seconds), | ρ | the size of a packet, and ν r the total number of received packets”. The simulation time was 1800 s, which was the actual total considered time. In Figure 5a, the throughput values for the schemes of Challa et al. [3], Farash et al. [21], Turkanovic et al. [18], Sharma and Kalra [39], Zhou et al. [41], and the proposed LDAKM-EIoT are 173.49 bps, 164.34 bps, 160.41 bps, 169.85 bps, 217.16 bps, and 148.95 bps, respectively. It was observed that the throughput of LDAKM-EIoT was less than the other schemes [3,18,21,39,41]. This was primarily due to the reason that LDAKM-EIoT applied the small sized messages, which caused less communication overhead for the authentication procedure as compared to the other schemes (see Table 6).

8.2.2. Comparative Analysis of the End-to-End Delay

The end-to-end delay ( E E D ) is measured as “the average time taken by the data packets to arrive at a receiving node from a sender node, and it is mathematically expressed in the form i = 1 ν p ( T r e c i T s e n d i ) / ν p , where T r e c i and T s e n d i are the receiving and sending time of a packet i, respectively, and ν p the total number of packets”. From the simulation results provided in Figure 5b, it was observed that E E D values for the schemes of Challa et al. [3], Farash et al. [21], Turkanovic et al. [18], Sharma and Kalra [39], Zhou et al. [41], and LDAKM-EIoT were 0.17230 s, 0.15151 s, 0.12478 s, 0.12496 s, 0.13707 s, and 0.11640 s, respectively. The E E D value of LDAKM-EIoT was less than the schemes provided in [3,18,21,39,41]. This was again due to the reason that LDAKM-EIoT applied small sized messages for the authentication procedure, which caused less end-to-end delay as compared to other schemes.

9. Conclusions

The edge based IoT environment suffers from serious security and privacy issues. It was observed that the majority of the existing schemes for authentication and key management have limitations as they were vulnerable to various attacks. Some of them were not even efficient from the computation and communication cost point of view. Consequently, a new authentication and key management scheme with lightweight cryptographic operations was designed for the edge based IoT environment (LDAKM-EIoT). The rigorous security analysis of LDAKM-EIoT using formal security verification using AVISPA tool and also other security analysis evidenced that LDAKM-EIoT could prevent different possible well known attacks. LDAKM-EIoT also supported new smart IoT device deployment in the network after the initial deployment. Moreover, LDAKM-EIoT preserved the anonymity and untraceability properties. LDAKM-EIoT was also compared with the closely related existing schemes in the IoT environment. The conducted comparative performance analysis and NS2 based simulation study on the network performance parameters evidenced that LDAKM-EIoT was much better in security and functionality features, communication, and computation as compared to other existing schemes.
In the future, we would like to implement the proposed LDAKM-EIoT in a testbed environment. Moreover, we would also like to include more functionality features in the proposed LDAKM-EIoT while maintaining less communication and computational overheads without degrading the security.

Author Contributions

Conceptualization, M.W., A.K.D., S.S., J.J.P.C.R. and Y.P.; Methodology, M.W. and A.K.D.; Security analysis, M.W. and A.K.D.; Investigation, M.W., A.K.D., S.S. and J.J.P.C.R.; Formal security verification, A.K.D.; Resources, A.K.D., S.S., J.J.P.C.R. and Y.P.; Writing-original draft preparation, M.W.; Writing-review and editing, A.K.D., S.S., J.J.P.C.R. and Y.P.; Supervision, A.K.D. and J.J.P.C.R.; Project administration, A.K.D., S.S. and J.J.P.C.R.; Funding acquisition, J.J.P.C.R., Y.P. and S.S.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (2017R1A2B1002147); in part by Fundação para a Ciência e a Tecnologia through the UID/EEA/50008/2019 Project; and in part by Brazilian National Council for Scientific and Technological Development (CNPq) via Grant No. 309335/2017-5. This work was also supported by the Office of the Assistant Secretary of Defense for Research and Engineering (OASD (R&E)) agreement FA8750-15-2-0120.

Acknowledgments

We thank the anonymous reviewers and the Editor for their valuable comments, which helped us to improve the quality and presentation of the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 2017. [Google Scholar] [CrossRef]
  2. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Conti, M.; Jo, M. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet Things J. 2018, 5, 269–282. [Google Scholar] [CrossRef]
  3. Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Reddy, A.G.; Yoon, E.; Yoo, K. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 2017, 5, 3028–3043. [Google Scholar] [CrossRef]
  4. Wazid, M.; Das, A.K.; Hussain, R.; Succi, G.; Rodrigues, J.J. Authentication in cloud-driven IoT based big data environment: Survey and outlook. J. Syst. Archit. 2019, 97, 185–196. [Google Scholar] [CrossRef]
  5. Das, A.K.; Zeadally, S.; He, D. Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 2018, 89, 110–125. [Google Scholar] [CrossRef]
  6. Zeadally, S.; Das, A.K.; Sklavos, N. Cryptographic technologies and protocol standards for Internet of Things. Internet Things 2019, 100075. [Google Scholar] [CrossRef]
  7. Glissa, G.; Meddeb, A. 6LowPSec: An end-to-end security protocol for 6LoWPAN. Ad Hoc Netw. 2019, 82, 100–112. [Google Scholar] [CrossRef]
  8. Makitalo, N.; Ometov, A.; Kannisto, J.; Andreev, S.; Koucheryavy, Y.; Mikkonen, T. Safe, Secure Executions at the Network Edge: Coordinating Cloud, Edge, and Fog Computing. IEEE Softw. 2018, 35, 30–37. [Google Scholar] [CrossRef]
  9. Yuan, J.; Li, X. A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion. IEEE Access 2018, 6, 23626–23638. [Google Scholar] [CrossRef]
  10. Khan, W.Z.; Ahmed, E.; Hakak, S.; Yaqoob, I.; Ahmed, A. Edge computing: A survey. Future Gener. Comput. Syst. 2019, 97, 219–235. [Google Scholar] [CrossRef]
  11. Esposito, C.; Castiglione, A.; Pop, F.; Choo, K.R. Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective. IEEE Cloud Comput. 2017, 4, 13–17. [Google Scholar] [CrossRef]
  12. Butler, B. What is Edge Computing and How It’s Changing the Network. Available online: https://www.cio.co.nz/article/627635/what-edge-computing-how-it-changing-network/ (accessed on 12 December 2019).
  13. Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552. [Google Scholar] [CrossRef] [Green Version]
  14. Wolf, M.; Serpanos, D. Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems. Proc. IEEE 2018, 106, 9–20. [Google Scholar] [CrossRef]
  15. Ni, J.; Zhang, K.; Lin, X.; Shen, X.S. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions. IEEE Commun. Surv. Tutor. 2018, 20, 601–628. [Google Scholar] [CrossRef]
  16. Yeh, H.L.; Chen, T.H.; Liu, P.C.; Kim, T.H.; Wei, H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767–4779. [Google Scholar] [CrossRef] [PubMed]
  17. Shi, W.; Gong, P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 2013, 2013, 730831. [Google Scholar] [CrossRef]
  18. Turkanovic, M.; Brumen, B.; Holbl, M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 2014, 20, 96–112. [Google Scholar] [CrossRef]
  19. Amin, R.; Biswas, G.P. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 2016, 36, 58–80. [Google Scholar] [CrossRef]
  20. Khalil, N.; Abid, M.R.; Benhaddou, D.; Gerndt, M. Wireless sensors networks for Internet of Things. In Proceedings of the IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 21–24 April 2014; pp. 1–6. [Google Scholar]
  21. Farash, M.S.; Turkanovic, M.; Kumari, S.; Holbl, M. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 2016, 36, 152–176. [Google Scholar] [CrossRef]
  22. Amin, R.; Islam, S.H.; Biswas, G.; Khan, M.K.; Leng, L.; Kumar, N. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 2016, 101, 42–62. [Google Scholar] [CrossRef]
  23. Srinivas, J.; Mukhopadhyay, S.; Mishra, D. Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Netw. 2017, 54, 147–169. [Google Scholar] [CrossRef]
  24. Jiang, Q.; Zeadally, S.; Ma, J.; He, D. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 2017, 5, 3376–3392. [Google Scholar] [CrossRef]
  25. Hsieh, W.B.; Leu, J.S. A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks. Wirel. Pers. Commun. 2014, 77, 979–989. [Google Scholar] [CrossRef]
  26. Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086–1090. [Google Scholar] [CrossRef]
  27. Khan, M.K.; Alghathbar, K. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’. Sensors 2010, 10, 2450–2459. [Google Scholar] [CrossRef] [Green Version]
  28. Vaidya, B.; Makrakis, D.; Mouftah, H.T. Improved Two-Factor User Authentication in Wireless Sensor Networks. In Proceedings of the Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE’10), Niagara Falls, ON, Canada, 12 October 2010; pp. 600–606. [Google Scholar]
  29. Wu, F.; Xu, L.; Kumari, S.; Li, X. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Hum. Comput. 2017, 8, 101–116. [Google Scholar] [CrossRef]
  30. Li, N.; Liu, D.; Nepal, S. Lightweight Mutual Authentication for IoT and Its Applications. IEEE Trans. Sustain. Comput. 2017, 2, 359–370. [Google Scholar] [CrossRef]
  31. Santos, M.L.B.A.; Carneiro, J.C.; Franco, A.M.R.; Teixeira, F.A.; Henriques, M.A.A.; Oliveira, L.B. A Federated Lightweight Authentication Protocol for the Internet of Things. arXiv 2019, arXiv:1907.05527. [Google Scholar]
  32. Gope, P.; Sikdar, B. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet Things J. 2019, 6, 580–589. [Google Scholar] [CrossRef]
  33. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proceedings of the Advances in Cryptology (Eurocrypt’04), Interlaken, Switzerland, 2–6 May 2004; Volume 3027, pp. 523–540. [Google Scholar]
  34. Han, J.; Kim, J. A lightweight authentication mechanism between IoT devices. In Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC’17), Jeju Island, Korea, 15–17 October 2017; pp. 1153–1155. [Google Scholar]
  35. Kung, Y.; Hsiao, H. GroupIt: Lightweight Group Key Management for Dynamic IoT Environments. IEEE Internet Things J. 2018, 5, 5155–5165. [Google Scholar] [CrossRef]
  36. Raza, S.; Magnusson, R.M. TinyIKE: Lightweight IKEv2 for Internet of Things. IEEE Internet Things J. 2019, 6, 856–866. [Google Scholar] [CrossRef]
  37. Jia, X.; He, D.; Li, L.; Choo, K.K.R. Signature based three-factor authenticated key exchange for Internet of Things applications. Multimed. Tools Appl. 2018, 77, 18355–18382. [Google Scholar] [CrossRef]
  38. Malani, S.; Srinivas, J.; Das, A.K.; Srinathan, K.; Jo, M. Certificate-Based Anonymous Device Access Control Scheme for IoT Environment. IEEE Internet Things J. 2019. [Google Scholar] [CrossRef]
  39. Sharma, G.; Kalra, S. A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 619–636. [Google Scholar] [CrossRef]
  40. Canetti, R.; Krawczyk, H. Universally Composable Notions of Key Exchange and Secure Channels. In Advances in Cryptology—EUROCRYPT; Knudsen, L.R., Ed.; Springer: Berlin/Heidelberg, Germany, 2002; pp. 337–351. [Google Scholar]
  41. Zhou, L.; Li, X.; Yeh, K.H.; Su, C.; Chiu, W. Lightweight IoT based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 2019, 91, 244–251. [Google Scholar] [CrossRef]
  42. Martinez-Pelaez, R.; Toral-Cruz, H.; Parra-Michel, J.R.; Garcia, V.; Mena, L.J.; Felix, V.G.; Ochoa-Brust, A. An Enhanced Lightweight IoT based Authentication Scheme in Cloud Computing Circumstances. Sensors 2019, 19, 2098. [Google Scholar] [CrossRef] [Green Version]
  43. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  44. Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments. IEEE Sens. J. 2016, 16, 254–264. [Google Scholar] [CrossRef] [Green Version]
  45. Bertino, E.; Shang, N.; Wagstaff, S.S., Jr. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Trans. Dependable Secur. Comput. 2008, 5, 65–70. [Google Scholar] [CrossRef]
  46. Das, A.K.; Wazid, M.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet Things J. 2018, 5, 4900–4913. [Google Scholar] [CrossRef]
  47. Chang, C.C.; Le, H.D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357–366. [Google Scholar] [CrossRef]
  48. Wazid, M.; Das, A.K.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet Things J. 2019, 6, 3572–3584. [Google Scholar] [CrossRef]
  49. Gope, P.; Lee, J.; Quek, T.Q.S. Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks. IEEE Sens. J. 2017, 17, 498–503. [Google Scholar] [CrossRef]
  50. Das, A.K.; Sharma, P.; Chatterjee, S.; Sing, J.K. A dynamic password based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 1646–1656. [Google Scholar] [CrossRef]
  51. Kumari, S.; Das, A.K.; Wazid, M.; Li, X.; Wu, F.; Choo, K.K.R.; Khan, M.K. On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 2017, 29, 1–24. [Google Scholar] [CrossRef]
  52. Armando, A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, H.P.; Heám, P.C.; Kouchnarenko, O.; Mantovani, J.; et al. Automated validation of Internet security protocols and applications. Notes Comput. Sci. 2005, 3576, 281–285. [Google Scholar]
  53. Wazid, M.; Das, A.K.; Kumar, N.; Odelu, V.; Reddy, A.G.; Park, K.; Park, Y. Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks. IEEE Access 2017, 5, 14966–14980. [Google Scholar] [CrossRef]
  54. SPAN, the Security Protocol ANimator for AVISPA. Available online: http://people.irisa.fr/Thomas.Genet/span (accessed on 12 December 2019).
  55. Secure Hash Standard. FIPS PUB 180-1. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995. Available online: http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf (accessed on 19 January 2019).
  56. Vanstone, S. Responses to NIST’s proposal. Commun. ACM 1992, 35, 50–52. [Google Scholar]
  57. Odelu, V.; Das, A.K.; Goswami, A. An efficient biometric based privacy-preserving three-party authentication with key agreement protocol using smart cards. Secur. Commun. Netw. 2015, 8, 4136–4156. [Google Scholar] [CrossRef] [Green Version]
  58. Perkins, C.E.; Royer, E.M. Ad-hoc on-demand distance vector routing. In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’99), New Orleans, LA, USA, 25–26 February 1999; pp. 90–100. [Google Scholar]
Figure 1. Network model of the edge based IoT environment.
Figure 1. Network model of the edge based IoT environment.
Sensors 19 05539 g001
Figure 2. Credentials stored in D i , C S j , and E N during registration processes.
Figure 2. Credentials stored in D i , C S j , and E N during registration processes.
Sensors 19 05539 g002
Figure 3. Abridging of the authentication and key agreement phase.
Figure 3. Abridging of the authentication and key agreement phase.
Sensors 19 05539 g003
Figure 4. Analysis of simulation results under the CL-AtSe and OFMC backends.
Figure 4. Analysis of simulation results under the CL-AtSe and OFMC backends.
Sensors 19 05539 g004
Figure 5. Comparison of network parameters: (a) network throughput; (b) end-to-end delay.
Figure 5. Comparison of network parameters: (a) network throughput; (b) end-to-end delay.
Sensors 19 05539 g005
Table 1. Notations used in the lightweight authenticated key management mechanism for the edge-based IoT environment (LDAKM-EIoT).
Table 1. Notations used in the lightweight authenticated key management mechanism for the edge-based IoT environment (LDAKM-EIoT).
SymbolMeaning
D i , I D D i ith IoT device and its identity, respectively
C S j , I D C S j jth cloud server and its identity, respectively
E N , I D E N Edge node and its identity, respectively
T A , I D T A Trusted authority and its identity, respectively
R I D D i , R I D C S j Pseudo identities of D i and C S j , respectively
T I D D i Temporary identity of D i
K E N D i 1024 bit shared secret key of the IoT device and edge node generated by T A
K E N C S i 1024 bit shared secret key of the edge node and cloud server generated by T A
n160 bit secret secret of T A , which is only known to T A .
R T S D i Registration timestamp of D i
n d , n c Number of IoT devices and cloud servers deployed initially, respectively
r d i , r e n 1 , r e n 2 , r c s j 128 bit random numbers of D i , E N , and C S j , respectively
T 1 , T 2 , T 3 , T 4 Current timestamps generated by different entities
Δ T “Maximum transmission delay” associated with a message
h ( · ) “Collision resistant cryptographic one way hash function”
S K D i C S j Session key between D i and C S j
| | , ⊕Concatenation and bitwise X O R operations, respectively
Table 2. Communication costs’ comparison. LDAKM-EIoT, the lightweight authentication and key management scheme for the edge based IoT environment.
Table 2. Communication costs’ comparison. LDAKM-EIoT, the lightweight authentication and key management scheme for the edge based IoT environment.
ProtocolNo. of MessagesNo. of Bits
LDAKM-EIoT42400
Challa et al. [3]32528
Farash et al. [21]42752
Sharma and Kalra [39]42912
Zhou et al. [41]43840
Turkanovic et al. [18]42720
Table 3. Comparison of computation costs.
Table 3. Comparison of computation costs.
SchemeUser/SmartGateway Node/Sensing DeviceTotal Cost
IoT DeviceEdge Node/Cloud Server
LDAKM-EIoT 9 T h 15 T h 8 T h 32 T h
2.88 ms 4.8 ms 2.56 ms 10.24 ms
Challa et al. [3] 1 T f e + 5 T e c m + 5 T h 5 T e c m + 4 T h 4 T e c m + 3 T h 1 T f e + 14 T e c m + 12 T h
104.20 ms 86 . 78 m s 69.36 ms 260.34 ms
Farash et al. [21] 11 T h 14 T h 7 T h 32 T h
3.52 ms 4.48 ms 2.24 ms 10.24 ms
Sharma and Kalra [39] 11 T h 7 T h 5 T h 23 T h
3.52 ms 2.24 ms 1.6 ms 7.36 ms
Zhou et al. [41] 10 T h 7 T h 19 T h 36 T h
3.2 ms 2.24 ms 6.08 ms 11.52 ms
Turkanovic et al. [18] 7 T h 5 T h 7 T h 19 T h
2.24 ms 1.6 ms 2.24 ms 6.08 ms
Table 4. Comparison of functionality and security features.
Table 4. Comparison of functionality and security features.
FeatureFarashChalla TurkanovicSharma andZhouLDAKM-EIoT
et al. [21]et al. [3]et al. [18]Kalra [39]et al. [41]
F S F 1 ××
F S F 2 ××××
F S F 3 ×××
F S F 4 ×××NA
F S F 5
F S F 6 ×××NA
F S F 7 ×
F S F 8 ×
F S F 9 ×
F S F 10
F S F 11 ××
F S F 12 NA
F S F 13 ×NA
F S F 14 ×NA
F S F 15 NA×××NA
F S F 16 ×
F S F 17 ××××NA
F S F 18 ×××
Note: F S F 1 : the property to make the user or smart IoT device anonymous; F S F 2 : protection for privileged-insider attack; F S F 3 : protection for off-line password guessing attack; F S F 4 : protection for stolen smart card or mobile device attack; F S F 5 : protection for denial-of-service attack; F S F 6 : protection for user impersonation attack; F S F 7 : protection for replay attack; F S F 8 : protection for man-in-the middle attack; F S F 9 : achieves mutual authentication; F S F 10 : achieves session key agreement; F S F 11 : property to make messages untraceability; F S F 12 : protection for sensor node/sensor/smart IoT device physical capture attack; F S F 13 : presence of server independent password update phase; F S F 14 : protection for sensor node/sensing device/smart IoT device impersonation attack; F S F 15 : support biometric update phase; F S F 16 : provide formal security verification using the automated software verification tool; F S F 17 : presence of the smart card revocation phase; F S F 18 : protection for session-key security under the CK adversary model. ×: insecure against a “specific attack” or a “particular feature” is not there; ✓: secure against a “specific attack” or a “particular feature” is present; NA: not applicable.
Table 5. Different parameters used in the simulation. AODV, ad hoc on-demand distance vector.
Table 5. Different parameters used in the simulation. AODV, ad hoc on-demand distance vector.
ParameterDescription
PlatformUbuntu 14.04 LTS
Tool usedNS2 2.35
Number of gateway nodes/edge nodes1
(whenever applicable)
Number of users or IoT device9
(whenever applicable)
Number of sensors or cloud server10
(whenever applicable)
Simulation time1800 s
Communication range of sensors/IoT devices100 m
Routing protocolAODV [58]
Table 6. Different messages exchanged among entities used in the simulation.
Table 6. Different messages exchanged among entities used in the simulation.
Exchanged Messages between Network EntitiesChalla FarashTurkanovicSharma ZhouLDAKM-EIoT
et al. [3]et al. [21]et al. [18]and Kalra [39]et al. [41]
U i / D i G W / E N 992 bits512 bits672 bits672 bits800 bits512 bits
G W / E N S D j / S j / C S j 1024 bits1024 bits1024 bits1024 bits1600 bits512 bits
S D j / S j / C S j G W / E N 672 bits576 bits672 bits960 bits512 bits
G W / E N U i / D i 544 bits448 bits544 bits480 bits864 bits
S D j / S j / C S j U i / D i 512 bits

Share and Cite

MDPI and ACS Style

Wazid, M.; Das, A.K.; Shetty, S.; J. P. C. Rodrigues, J.; Park, Y. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment. Sensors 2019, 19, 5539. https://doi.org/10.3390/s19245539

AMA Style

Wazid M, Das AK, Shetty S, J. P. C. Rodrigues J, Park Y. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment. Sensors. 2019; 19(24):5539. https://doi.org/10.3390/s19245539

Chicago/Turabian Style

Wazid, Mohammad, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, and Youngho Park. 2019. "LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment" Sensors 19, no. 24: 5539. https://doi.org/10.3390/s19245539

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop