Next Article in Journal
Wearable Sensors for Learning Enhancement in Higher Education
Next Article in Special Issue
Local Scheduling in KubeEdge-Based Edge Computing Environment
Previous Article in Journal
Preliminary Evaluation of a System with On-Body and Aerial Sensors for Monitoring Working Dogs
Previous Article in Special Issue
Latency-Aware Task Scheduling for IoT Applications Based on Artificial Intelligence with Partitioning in Small-Scale Fog Computing Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Autonomous Mutual Authentication Protocol in the Edge Networks

by
Ruey-Kai Sheu
1,
Mayuresh Sunil Pardeshi
2,* and
Lun-Chi Chen
1
1
Department of Computer Science, Tunghai University, Taichung 407224, Taiwan
2
AI Center, Tunghai University, Taichung 407224, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(19), 7632; https://doi.org/10.3390/s22197632
Submission received: 16 September 2022 / Revised: 5 October 2022 / Accepted: 6 October 2022 / Published: 8 October 2022
(This article belongs to the Special Issue Edge/Fog Computing Technologies for IoT Infrastructure II)

Abstract

:
A distinct security protocol is necessary for the exponential growth in intelligent edge devices. In particular, the autonomous devices need to address significant security concern to function smoothly in the high market demand. Nevertheless, exponential increase in the connected devices has made cloud networks more complex and suffer from information processing delay. Therefore, the goal of this work is to design a novel server-less mutual authentication protocol for the edge networks. The aim is to demonstrate an autonomous mutual authentication amongst the connected smart devices within the edge networks. The solution addresses applications of autonomous cars, smart things, and Internet of Things (IoT) devices in the edge or wireless sensor networks (WSN), etc. In this paper, the design proposes use of a public-key system, octet-based balanced-tree transitions, challenge–response mechanism, device unique ID (UID), pseudo-random number generator (PRNG), time-stamps, and event specific session keys. Ultimately, server-less design requires less infrastructure and avoids several types of network-based communication attacks, e.g., impersonating, Man in the middle (MITM), IoT-DDOS, etc. Additionally, the system overhead is eliminated by no secret key requirements. The results provide sufficient evidence about the protocol market competitiveness and demonstrate better benchmark comparison results.

1. Introduction

In edge networks, local data processing and storage helps to make it independent of complex network infrastructure [1,2]. Therefore, edge network devices should be protected to avoid major attacks [3,4] such as DDOS, ransomware, man in the middle (MITM) attack, etc. As the paradigm of distributed computing, edge network devices centralize data centers and acts as smart things to overcome cloud computing limitations. High-speed data networks such as 5G wireless communication have boosted the application of edge devices and increased the vulnerability at the same time. Hence, this work uses authentication protocol to secure the multiple edge device interconnectivity for the Internet of Things (IoT) communication.
Evolution of edge computing marks a significant change by overcoming the client–server or network architecture limitations. As the edge devices can function independently, a network communication delay and shortest path planning is eliminated. Therefore, for the secure communication of the edge devices we have designed an autonomous mutual authentication protocol. Security is an essential factor for protecting the data confidentiality and integrity. To ensure secure communication, this work provides authentication within the independent edge devices. The scope for this work is providing a security solution for the protection of IoT devices against malicious contents to function smoothly and efficiently. The data communication consists of a unique session key generation and exchange within edge devices to achieve mutual authentication by the protocol. The background knowledge for this work contains authorization, public-key cryptography, challenge–response mechanism, session keys, PRNG, and mutual authentication. Public-key cryptography is also popularly known as asymmetric cryptography, which uses unique pairs of different keys for encryption and decryption as public key and private key, respectively. These keys are generated as a part of cryptographic algorithms by a one-way function in which the public key is disclosed to everyone for communication. The authorization of the official registered user is said to be granted or approved after the genuine user permission is assigned, e.g., Diffie–Hellman key exchange, elliptic-curve cryptography, Rivest–Shamir–Adleman (RSA) algorithm, etc. In the challenge–response mechanism, the party wishing to communicate first needs to provide a valid answer to the question as set by the other party for authentication. The session keys are part of communication protocol, which are shared for the validity confirmation between multiple parties as a part of the agreement. The PRNGs are derived from linear congruential generator algorithms, which function as a deterministic random bit generator having properties similar to the approximation of a random number. Mutual authentication can be defined as an authentication protocol process performed between the two parties at the same time.
The motivation for this work is given as “How to design a mutual authentication protocol for the autonomous devices in the edge network?” [5,6,7,8]. Considering the independence feature of the autonomous devices for mutual authentication, they must not be restricted to a particular area network after the registration phase [9,10]. Therefore, referring to the autonomous vehicular protocol design community, many researchers have started improving the security authentication and confidentiality communication, following Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, and S. Sitharama Iyengra in 2004, who applied it in autonomous system traceback for authentication [11]. The inclusion of third-party infrastructure in the authentication of the autonomous vehicle process has been a challenge that acts as an overhead on the resource-constrained IoT devices, which needs to be resolved.
Henceforth, in this work, a novel challenge–response model using pseudo-random-number-based octet’s transitions is proposed. Finally, the results have demonstrated to be an efficient protocol in the edge network and its respective performance details.

1.1. Objectives

Authentication is considered to be one of the key components for performing secure communication within distributed systems. Therefore, it must be included within the recent autonomous edge networks for better security. There are multiple authentication protocols in the distributed system, but the process is incomplete without servers. Therefore, this work proposes a novel protocol that can authenticate multiple devices by mutual authentication without the need of any server for initiation, authentication, and management.
  • A novel protocol design for the mutual authentication in the edge networks: This work demonstrates an idea for the challenge–response model by establishing an authentication process within the autonomous devices performing the session key exchange as the part of valid response by the requesting party. Therefore, mutual authentication is achieved after solving challenges, which are provided by both the parties to each other. The protocol design has included use of a unique session key, different time-quarter-based PRNG random values, time-stamps, and the transitions within the group of octet’s position.
  • Server-less mutual authentication within the independent devices: Authorization is selected as the basic requirement for this work. Thus, authorized devices can only initiate and implement the authentication protocol. Autonomous operations make the multiparty authentication independent of the external server. Thus, the traditional approach of using server or third-party systems within the mutual authentication protocol limitations is resolved by this work. Therefore, complete autonomy on the operations is achieved.
  • Multiple IoT device authentications within the network: Multiple IoT devices exist within a network with the mobile workstation as a portable device. This work presents the communication within the autonomous edge devices that can iterate, process, and authenticate each other without any fixed system/server for achieving complete autonomous status. Successively, autonomous devices with public keys can mutually authenticate each other and can form a trusted network. The IoT devices can connect to multiple devices within the wireless local network for a single communication session.
  • No additional support of infrastructure and IoT resource-constrained device utilization: Architecture of several authentication protocols consists of a service server for key distribution, ticket-granting server (TGT), for process validation and authentication server for confirming the process and declaring successful authentication. Inclusion of many servers creates a bottleneck in the system. Additionally, several calculations with different servers are not suitable for IoT resource-constrained devices. In this work, there is no need for a ticket-granting (TGT), service server and authentication server. Whereas, the need for registration server after registration phase is completely eliminated. Minimal calculations and no secret key leads to reduced overhead on resource-constrained devices.

1.2. Applications

  • Secure Autonomous Cars: Recently, many car manufacturing companies are competing in the market to provide self-driving/autonomous cars and vehicle platooning. The connectivity within cars for exchanging information is authenticated for secure communication.
  • Secure Drones: A drone network is usually required for smart farming; package delivery for food, products, medical vaccines at remote or higher altitude places; tracking lost people on mountains; synched drones for entertainment; etc.
  • Secure Satellite Communication: The satellite network for providing region/countrywide internet access needs to be synchronized and interconnected. New satellites can join and later can reconnect using an autonomous mutual authentication protocol. Thus, dependency on third parties is reduced.
  • Secure IoT and Device Communication: All the end devices within a network can connect to each other securely by authentication, i.e., IoT devices, laptop, computer, tablet, etc. The communication between these authenticated devices is secured by cryptography and has a dynamic session key instead of using a master secret key.
The description of this work is organized herein as follows: presentation of literature survey in Section 2; protocol phases as methodology in Section 3; and theorems with proofs in Section 4. Afterward, the protocol verification logic is given in Section 5 and protocol defense in Section 6. Lastly, the experiments are given in Section 7 followed by the conclusions.

2. Literature Survey

The privacy preservation in the autonomous transportation system is presented by Sucasas V. et al. [2], and similarly for Huang et al. [12]. This work focuses on eliminating the pseudonym-based congestion and trusted authority dependency. Thus, the autonomous protocol to reduce dependency on trusted authority is implemented using bilinear maps, elliptic curve discrete logarithm problem (ECDLP), collusion attack algorithm (CAA), fiat-shamir heuristics, and hash chains. The autonomous connectivity between multirobot systems is demonstrated by Wei Liang et al. [13]. This scheme uses trusted identity authentication and the hash-pool-based consensus algorithm. The operations include permuting hash functions in hash pool, random number generator, device IDs, public keys, private keys, and multiple signatures. The JTAG authentication using an autonomous algorithm is presented by Lapeyre S. et al. [14]. This work has a lightweight plug-and-play solution for automated test equipment with two cryptographic hashes algorithms and claims to be better than the SHA3 algorithm. An autonomous protocol for distributed IoT security by smart contract is demonstrated by Wickström J. et al. [15]. This work design consists of an ethereum smart-contract-based security model while keeping it independent of network connections and acts as a generic task creator with reporting. The peer-to-peer (P2P) autonomous authentication scheme is presented by Alkhalaf S. [16]. The anonymous access problem is resolved by using group identification and support vector machine-based classification. In a decentralized autonomous network, a blockchain-based authentication is demonstrated by Wang M. et al. [17]. This work overcomes the complexity of cross-domain authentication by using multicertification authority (CA) and a distributed blockchain base for gaining trust. The artificial neural group key synchronization-based security within autonomous vehicles is presented by Khan M.Z. et al. [18]. The architecture consists of a vehicle-to-everything (V2X) heterogeneous network for information fusion, synchronization using ring framework, B-tree, and triple layer tree parity machines for key exchange processes. The device-to-device (D2D) security by multichannel authentication is demonstrated by Li T. et al. [19]. The Diffie–Hellman key exchange is used within optical-link communication with an LED light and camera in a D2D multichannel authentication having full and half duplex modes. The autonomous robot communication security within the shipping network is presented by Yang J. et al. [20]. The robots are used for parcel delivery using QR codes, hash functions, and asymmetric encryption, whereas, the Siamese network performs noncooperative user identification and re-identification. The autonomous vehicle applications in smart farming are presented by Bilbao-Arechabala S. et al. [21].
The complete automation of smart farming is achieved by ISO 7798-2 security specifications—heterogeneous swarms are used in cloud middleware to operate drones, autonomous vehicles, etc. Autonomous-vehicle secure connectivity using IoT devices and key management framework is demonstrated by Jha S. et al. [22]. The vehicular network authentication is performed by blockchain based on hash graphs that can perform thousands of transactions per second and a framework designed using batch rekeying and logical key hierarchy (LKH). The 5G cooperative autonomous connectedness and driving is presented by Bagheri H. et al. [23]. This system uses 5G-based extensive authentication protocol (EAP) supporting 3GPP and non-3GPP communication networks, independent access, and mobility management function with session management function. The autonomous communication within the P2P network is demonstrated by Rahmani L. et al. [24]. A distributed hash table for agent lookup is shared by all the communicating agents and uses public-key cryptography for secure P2P communication with end-to-end encryption. An IoT mutual authentication protocol for Things-To-Things (T2T) is presented by Lounis K. et al. [25]. The T2T protocol uses physical unclonable functions (PUFs) with dual-level-challenge response pairs for the IoT authentication. V2X communication-based efficient authentication for protection against DDOS is demonstrated by Ko T. et al. [26]. The V2X system uses a security credential management system (SCMS), which classifies multiple similar messages in different categories for authentication and uses advanced verify-on-demand (AVoD) for signature verification with threat analysis. An improved isolation forest method for autonomous-vehicles-attack detection is presented by X. Duan et al. [27]. The detection of data-tampering attack is performed here using data mass and scoring for anomaly detection as a part of intrusion detection. An autonomous vehicle smart-parking system with the fog–blockchain architecture is presented by Shahzad A. et al. [28]. Smart parking helps to recognize the parking location with the help of fog nodes to IoT, the proof-of-concept by lightweight blockchain and a cryptographic module is utilized. Blockchain-based autonomous vehicle platoon management in 5G is demonstrated by Wu B. et al. [29]. This real-time system improves traffic management with public-key cryptography and 5G-enabled revocable attribute-based encryption (RABE) with key distribution and revocation. P2P drone communication using blockchain is presented by Kumar M.S. et al. [30]. The drone base communication uses blockchain with GPS coordinates to avoid spoofing attacks and keeps the blacklisted database.

Analysis of the Survey Limitations

  • The need for additional infrastructure for the authentication protocol: Several recent works that are developing authentication protocols include blockchain-based operations by having dependency on the service server, ticket-granting server (TGT), and authentication server. Therefore, these authentication protocols are not suitable for the autonomous devices as they require higher dependency on the multiple systems for the purpose of authentication.
  • High-calculation requirements for the IoT resource-constrained devices: The traditional cryptographic algorithms and protocols are not suitable for the autonomous devices as most of the IoT resource-constrained devices possess limited memory and processing power. Therefore, design of a new authentication process is required to avoid high calculations on the IoT devices and to perform efficiently for multiple authentications.
  • Design issues limiting the protocol performance: The inclusion of popular technologies and references, i.e., blockchain, Kerberos, elliptical curve cryptography (ECC), in the protocol design without a specific objective is one of the large mistakes in many works. Such design issues lead to low performance and bottlenecks within the system, which are not suitable for the autonomous devices.

3. Methodology

The architecture for autonomous-device connectivity in general is shown in Figure 1. The autonomous devices can connect 1:1, 1:M (many), and M:M device connections, whereas autonomous devices can operate independently or collectively. The purpose of connectivity is to receive status, position, information exchange, and control remote devices. The applications are given as drone-based delivery, robotic fire extinguishers, drone base smart farming, self-driving car/bus, car platooning, smart surveillance, etc.

3.1. Initialization Phase

The purpose of the initialization phase is to define the structural setup required for protocol functioning. All the citizens interested in securing their personal devices can download the autonomous protocol setup by registering on the government’s national website to utilize this service. The distributed network connecting every state/region’s government server will also keep the record logs for the public keys with active and migrated registered devices. Therefore, the registered user’s device information will be kept on both national and regional servers to allow for ease of interoperability.

3.2. Registration Phase

The users follow the instruction for the edge device registration on the national portal RS. The user’s personal unique ID (UID) and device ID are required to complete the registration process on the national website. Each device is assigned a unique public key that can be an automobile car, a computer/laptop, autonomous drones, ships, robots, etc. The user will also receive the public keys of all the registered devices within that state/region. Henceforth, the regional-level portal server will possess a list of local registered edge devices, which will be accessible while traveling to other regions and can access new public keys without the need to re-register his/her devices. The national central server will also possess the state wise edge devices public key’s, which are accessible to the trusted authorities. A distributed database stores the UID linked device details in either cloud or blockchain based server because of immutability and distributed ledger feature.

3.3. Authentication Phase

The public key and protocol interaction format received by user C makes him or her eligible for the authentication process. Figure 2 presents the balanced tree containing 8 octets. The PRNG is applied here in the four time-quarters based on each six-hour slot. For every time-quarter, the PRNG parameters are changed and the pseudo-random numbers generated are distributed serially in the 8 octets. According to Figure 2, the sender initiates the protocol by sending the time-stamp as a challenge in the message, where the time-stamp’s last value or a random number is taken as n o d e v a l u e . The number obtained can be seen in the figure; blue highlights the position in all adjacent octets, as given in Equation (1).
n o d e v a l u e = k = 0 7 ( n o d e v a l u e + 8 )
Therefore, the first challenge set by the sender is completed after the response is combined with the selected pseudo-random values by XOR, and responds to it in the second message. In the second challenge, which is set by the responder, the XOR of the consecutive octets is taken at a particular position by incrementing itself every time in Equation (2), as shown by green in Figure 2.
n o d e v a l u e = k = 0 7 ( n o d e v a l u e + 9 )
Figure 3 presents the mutual authentication protocol process within the autonomous sender and receiver with notations from Table 1.
The detailed stepwise process for autonomous mutual authentication follows.
(1)
The sender S is required to initiate the authentication process by providing the “Hello” message with his public-key P K s and the current time-stamp T S 1 in seconds. The P K s provided by the sender is actually a part of challenge 1 sent for the octet node to be selected.
S R : ( H e l l o P K s T S 1 )
(2)
The receiver R first checks for the validity of the sender’s public key P K S and takes the last value of the time-stamp T S 1 sent by the sender S with modulus 8. The receiver then sets the PRNG parameters based on the time-quarter and generates the pseudo-random numbers for 8 octets. Therefore, the value obtained from the time-stamp with modulus 8 of the sender is taken to select the first octet’s value and the same value from consecutive octets. Successively, the combination by average from Equation (1) obtained from random numbers is a solution to the first challenge and is returned to the sender for confirmation as transition λ R . The second message is formed by the octate group as M 8 × 8 multidimensional matrix, λ R transition value, P K R   as receiver’s public key, t t l as time-to-live for this message’s validity, and K S , R = H ( λ R   T S 1 )   as the session key, which is encrypted by the public key of sender E P K S .
R   S :   E P K S ( K R , S M 8 × 8   λ R P K R t t l )
(3)
The sender, after receiving the response, decrypts it by his private key D S K S . Optionally, the sender then checks the transition value λ R , and calculates it from the consecutive octates. Thus, the hash calculation of the session key K R , S achieves the challenge 1 confirmation. Challenge 2 is initiated by the next value by the previous challenge in the first octet, and then collects the value incremented every time in the consecutive octets, as shown by green in Figure 2. The transition value obtained by XOR is λ S . Successively, the session key K S , R = ( λ S   T S 2 ) with the current time-stamp is calculated and sent to the receiver as the challenge 2 with device address. It is encrypted by the public key of receiver P K R . This message has to be responded to before the time-to-live t t l given by the receiver.
S R :   E P K R ( K S , R   λ S T S 2 a c )
(4)
The receiver decrypts the received encrypted message by his private key D S K R and obtains the challenge 2 response by the sender. The decrypted message is confirmed to be correct by calculating the transition value λ S and by the hash value of the session key K S , R . The device address a c received is kept for the purpose of device identification. The final session key is E P K S = H ( K R , S K S , R ) . This session-key-combining process is already known by the sender; when he or she decrypts the final message with a symmetric key to know about authentication from the receiver, then the mutual authentication is succeeded.
R   S :   E P K S ( A u t h e n t i c a t e d )

3.4. Communication Phase

The autonomous devices attempt to connect to the local devices dynamically with the purpose of instructing or information sharing. Subsequently, in the edge network, the devices are not mandatorily required to possess an internet connection or otherwise connect by Bluetooth and can request to connect by authentication with a condition of maximum two challenge–response trials. The autonomous authentication process is initiated only if the public key of the sender and receiver are present within the public-key database. Therefore, absence of such a public key indicates updating the public-key database of the communicating parties and later confirms their legitimacy.

3.5. Revocation Phase

Once the multiple autonomous devices authenticate each other and, if due to location/communication lag, the mutual session key is terminated. In the case of re-initiating the authentication, the autonomous protocol should be succeeded in the next two attempts; otherwise it will be blocked for one day. Every device maintains its own list of blocked devices which is cleared every day. The purpose of the key revocation phase is to keep log records for security audit at a regular interval.

4. Analysis of Hardness of Autonomous Protocol

Theorem 1.
If the multiple communicating parties as sender S and receiver R can successfully complete the authentication process, in such cases the validating receiver R always accept the sender S as valid.
Proof of Theorem.
According to the autonomous protocol process with reference to Section 3.3 Authentication Phase. If the sender S and receiver R are equipped with the authentication process with the secret of octet-group balanced tree, key generation, cryptographic algorithm, time-quarters, challenge–response within the multiple parties, then the challenge is initiated by the receiver R as
R   S :   E P K S ( K R , S M 8 × 8   λ R P K R t t l )
Therefore, S R :   E P K R ( K S , R   λ S T S 2 a c ) is confirmed to be valid when the receiver combines the temporal session key to be the final session key as R   S :   E P K S ( A u t h e n t i c a t e d ) . Ultimately, the successful completion confirms the authentication. □
Theorem 2.
Considering the constructed possible solutions for the two challenges of octet-group balanced-tree transitions by the malicious user M ^ u , while assuming he is highly capable as receiver R. When M ^ u impersonated R and initiates the autonomous protocol process to approach S that he is real R, in such case the probability of M ^ u success is quite high.
Proof of Theorem.
The search for a solution is intractable by the zero-knowledge proofs (ZKP) process for the transitions in octet-group balanced tree. Therefore, the possible solutions to this problem are equivalent to computing matrix multiplications by the number theory concepts. For challenge 1, M ^ u choses a subtree to perform possible transitions during the attack. In every case of the challenge event, it is worth noting that the PRNG generates different parameters based on pseudo-random numbers, which are combined as ⊕ with a time-stamp to generate session keys for all the autonomous edge devices. Thus, M ^ u required for challenge 1 is to provide accurate tree nodes and its respective transition combination as the solution.
R   S :   E P K S ( K R , S M 8 × 8   λ R P K R t t l )
For challenge 2, M ^ u needs to achieve the octet-based transition related to time-stamp-based parameters. Multiple octet values are stored as a transition, which is combined as ⊕ with the time-stamp as the final shared session key required to be calculated within a time limit.
S R :   E P K R ( K S , R   λ S T S 2 a c )
Theorem 3.
Autonomous system authentication is a ZKP protocol.
Proof of Theorem.
In the autonomous protocol process, the temporal session keys K R , S and K S , R exchange are encrypted by the public keys of both the parties that are part of the challenge–response scheme. Consecutively, the use of pseudo-random numbers, transitions values, octet-based balanced tree, and time-stamp combination makes the protocol process very hard to analyze and construct an accurate solution. Ultimately, it can be noted that M ^ u is unable to devise a time-quarter-based solution and guess about any possible solution either for the challenge or ZKP. Henceforth, a strong claim for autonomous system authentication in the edge network is a ZKP protocol. The autonomous authentication achieves the ZKP process between multiple devices and can defend M ^ u ’s impersonation attack. □

5. Protocol Verification Logic

5.1. Message Exchange

The process below signifies the message exchange between the sender and receiver:
A B :   K a , T 1 B A :   { K b , a , M 8 × 8 , λ b , K b , T s } K a A B :   { K a , b , λ a , T 2 , P a } K b B A :   { } K a b
This process notations can be elaborated as K a , b and K b , a as session keys for the protocol process, and K a b as an event session key with limited validity used before and after the protocol authentication with cryptography. During the protocol process initiation, the public key and time-stamps of sender A are used. Later, receiver B starts challenge 1 with public keys as temporal session keys K a b in the successive steps. The challenges solved by both the communicating parties and approved response results in the last step of protocol success as authentication.

5.2. Idealized Protocol

The construction of the idealized protocol is given below:
A B :   K a A , T 1 B A :   { A K b , a B , M 8 × 8 , λ b , K b B , T 2 } K a A B :   { A K a , b B , λ a , T 3 , P a } K b .   B A :   { } K a b .  
The idealized protocol emphasizes the entities and the use of public keys amongst them for sharing with cryptographic operations. This protocol format is quite similar to the message exchange. Messages 1 and 2 contain the exchange of public keys. The cryptographic operations by public keys are performed in messages 2 and 3. The temporal-shared session key valid for an event is shared for confirmation in message 4 as K a b .

5.3. Protocol Analyzed

The construction of the analyzed protocol according to the formal logic is given as follows:
A   b e l i e v e s K a A ,   B   b e l i e v e s   K b B A   b e l i e v e s   ( S   c o n t r o l s   K B ) B   b e l i e v e s   ( S   c o n t r o l s   K A ) A   b e l i e v e s   f r e s h   ( K a , b ) ,   B   b e l i e v e s   f r e s h ( K b , a ) A   b e l i e v e s   ( A K a , b B ) B   b e l i e v e s   ( A K b , a   B ) B   b e l i e v e s   f r e s h   ( K a b )
The protocol-analyzed formal logic given above presents the ownership of public keys by the users. Successively, the registration server is responsible for creating and assigning the public keys to users A and B, which are believed by both users to be correct. Server S is capable of generating genuine public keys and distributing it to both parties. Therefore, both the parties believe that fresh temporal session keys are exchanged amongst them for every new authentication process, and the final session key received by B, described in Section 3.3, authentication phase step 4, confirms the successful completion of the authentication process.

5.4. Final Beliefs

The conclusion of the final analysis is given by the final beliefs, as follows.
A   b e l i e v e s K b B B   b e l i e v e s   K a A A   b e l i e v e s   A K a b B ,   B   b e l i e v e s   A K a b B A   b e l i e v e s   B   b e l i e v e s   A K a b   B B   b e l i e v e s   A   b e l i e v e s   A K a b   B
In this part of belief, the entities believe that the other entities are aware of their public keys. Ultimately, the final session key is known to both entities. Therefore, all the entities believe that the temporal session keys exchanged previously amongst them are trustable, which completes the mutual authentication process successfully.

6. Autonomous Protocol Defense for Attacks

  • Impersonation: In case of autonomous authentication, a malicious user M ^ u needs to validate himself or herself to the server or third-party system by spoofing his identity. Therefore, M ^ u can directly take the identity of some valid user and can try to validate S   R : ( H e l l o P K s T S 1 ) . in the first message. If the identity belongs to an interstate user and he or she is not updated in the current state/region’s user list, then he or she will be rejected. Nevertheless, bypassing the identity validation, M ^ u will not be helpful to possess the authentication protocol steps to move further.
  • Wormhole: M ^ u ’s presence can cause it to reroute the packets from different systems. In such a case, the sender can bypass step 1 but will fall short of the time to live (ttl) in protocol step 2. In step 2, the challenge 1 with R   S :   E P K S ( K R , S M 8 × 8 λ R P K R t t l ) is initiated, which provides the required group of parameters in the encrypted message. Even though M ^ u can receive the message, unaware of the encryption and ttl, he or she will be rejected and blocked after two unsuccessful attempts.
  • Sinkhole: In case of selective modification performed by M ^ u , the autonomous protocol will be discontinued due to the hash-function calculation and its usage in the session key generation. The sender can attempt to change the transition key λ S , if he or she succeeds in cracking the encryption, the same as sender’s private key D S K S . Nevertheless, the ttl and new transition value with the attempted hash for the generation of session key K S , R = ( λ S   T S 2 ) will be rejected further on.
  • Eavesdropping (man in the middle attack): The attempt of M ^ u to perform the MITM attack is performed by intercepting reading and modification of message contents. As autonomous protocol consists of encryption/decryption E P K S ,   D S K S . by user’s public/private key P K S , S K S will be very hard to break. Later, the communication event within users is secured by the session key’s E P K S , which is unique for every event. These three different groups of keys make the MITM attack fail in the autonomous protocol.
  • Replay: The purpose of replay attack is to repeatedly send similar messages with some modification. The public key P K S can be thought of as valid, but the time-stamp T S 1 needs to be applicable. As discussed earlier, the decryption of the encrypted messages will be a challenge. A small modification will not be beneficial as the response guessing to challenge 1 and 2 would be incorrect. Therefore, a random guessing of the message parameters and replay consisting of time-stamps T S 1 and T S 2 will be unacceptable.
  • Byzantine: Replaying the intercepted message multiple times and using a nonoptimal path for communication will not be applicable in the autonomous protocol. The replaying will be invalid due to expiry of time-stamps T S 1 and T S 2 , whereas the nonoptimal path does not exist in the direct communication protocol. Thus, multiple unsuccessful attempts will lead to blocking of the malicious device.
  • Location Disclosure: The autonomous protocol process accepts the device/system location only after the successful completion of challenges 1 and 2. The location disclosure attack performs the multiple device location and message exchange recording. As the autonomous systems are dynamic and do not frequently communicate, then the location information will be useless. Additionally, the message recorded will not be useful later due to the update in time-stamps T S 1 , T S 2 , session keys K S , R ,     K R , S , and challenge–response transitions λ S and λ R .

7. Experiments

The purpose of the experiments section is to demonstrate the autonomous protocol performance on different devices and the key exchange. A detailed implementation with system settings, session key generation with hash calculations, pseudo-random number generations, protocol performance, and implementation with different time-quarters are explained in detail. To achieve better security and higher performance, the autonomous protocol uses the SHA-256 hash function instead of traditional hash functions. The message exchanges are protected with the cryptographic operations and time limits.

7.1. System Configuration

The details of the system configuration used are given in Table 2. The system configuration consisting of different devices shows similar graph behavior with different performance time. The experiments were performed on the separate edge devices: mobile workstation/laptop and Raspberry Pi 3B for measuring the detail performance [31]. We used different PRNG for different time-quarters with no significant difference in the key generation and for performance, but are better for security. In the authentication process, the receiver is responsible for generating the PRNG and sharing it as a challenge matrix M8×8. Different PRNGs combined with unique time always provide a distinct hash key. The random variables generated by PRNG [32] have higher graph distribution variance and result in good security applications.

7.2. Results Analysis

In Figure 4, the 100 keys generated for session key 1 K S , R , session key 2 K R , S , and session key 3 PK S are shown. The time required for the calculation on the mobile workstation is seen to be growing at a similar rate amongst the session keys. Figure 4 shows the session-key-generation time analysis, where the time for session key 2 is the highest due to communicating the challenge matrix M 8 × 8 ; session key 1 has a similar time to session key 2 for calculating challenge 1, and session key 3 has the lowest time requirements by sharing the final sessional key in the authentication protocol.
The PRNG used within this work refers to the linear congruential generator (LCG) parameters from the standard declared for cryptographic random number preferences [32,33,34]. The session keys generation time in Figure 5 with different LCG parameters can be seen in graph analysis. In the LCG 1 with GCC parameters, the key generation usually grows at an increasing rate because of the computation time requirements, and in (a), (b), and (c), it can be seen that a spike occurs around the 8000 node’s key generation. Similarly, in the case of LCG 2 Borland- and LCG 3 Turbo-based parameters, the graph behavioral analysis spiked after crossing some node limits.
This evaluation can be performed using less computation time if the workstation used is of higher configuration. In Figure 6, the total time required by different LCG parameters is shown by the graph analysis, which is quite similar to each other for 1000 to 10,000 node protocol implementation on the mobile workstation. Even though the parameters are distributed randomly and without any similarity between them, which is known as unpredictable, the time taken by the autonomous protocol implementation in 10,000 nodes is still quite similar.
In Figure 7, the protocol time analysis for mobile workstation, IoT device 1, and IoT device 2 is shown. The time required on the mobile workstation is less when compared to IoT devices due to the high processing capacity, as shown in Table 2. While increasing the nodes from 100 to 1000, the total time can be seen increasing due to computation requirements for the protocol implementation. In comparison, the protocol implementation on the Raspberry Pi IoT device can be seen increasing smoothly due to less computation capacity. Therefore, the total time is smoother in the low-end device but has higher time implementation requirements on the resource-constrained devices.
Figure 8 shows the comparison of different PRNG parameter settings for the autonomous-protocol-based authentication for the nodes from 1000 to 10,000. As the pseudo-random numbers used here are highly variable in their numerical range, it can be observed in the graph that the time requirements for every one-thousand-node authentication changes in every computation event. Here, the channel encryption is used in such a way that the nodes are generated in parallel so that cryptographic time operation is considered to be in parallel time for every event. The cryptography for every encryption/decryption for complete protocol is performed in 22 milliseconds, referred from the cipher suite 1, consisting of the LEA, SPONGENT, and HMAC algorithms [35]. Several cryptographic operations can be applied, such as lightweight, low latency, and optimal power communication network, for the HLCAS sensor [36], enhanced energy-efficient cryptography method E3LCM [37], and resource-constrained device networks, i.e., LED, TWINE, and LEA for 32-bit microcontrollers [38].
Table 3 provides the authentication time between the mobile workstation and IoT device with different LCG parameter settings [32]. GCC LCG parameters are observed to require the highest time for authentication, followed by Borland and Turbo. The time requirements may change on each protocol execution depending on the parameters and time. In the case of IoT device 1 to IoT device 2 authentication, given in Table 4, it is observed that computation time of session key 1 is quite high when compared to the session key 2 and session key 3 time. Similarly, in this case, the total time for GCC is higher when compared to Borland and Turbo. It can be noted that IoT devices require significant time to initialize the protocol when compared to other keys calculation. Table 5 presents the computational cost with parameters for hash function C C h and cryptographic operations C C c for encryption and decryption usage. The total cost provides an analysis for the functions used within the respective protocols.
In Table 6, the feature comparison between multiple protocols is stated. It presents the achievements of the autonomous protocol over recent works.
In Table 7, the comparison with multiple schemes includes parameters T H as one-way hash function, T E C M as ECC scalar multiplication, T f e as fuzzy extraction operator, and T S E / D as symmetric encryption and decryption [49,50,51].
In Table 8, the total time for protocol completion including communication time is presented. The two IoT schemes referenced, which have efficient mutual authentication [46] and two-phase authentication protocol in WSN [49], suffer due to the inclusion of a server/third party for the certificate-based authentication. In comparison, the autonomous protocol performs much better by excluding the dependency on server/third-party systems for the authentication. Furthermore, in comparison to the referenced systems, the calculation time for the autonomous protocol is also less.

8. Conclusions

Autonomous authentication is crucial for secure communication in edge networks. Thus, competitive world-class research is presented that can prevent major attacks, independent of the server/third-party systems and no requirements for storing secret keys, and has better computational time on mobile workstations and resource-constrained IoT devices. The significant idea of the challenge–response system that uses a unique session key for every new authentication is highlighted in this work. The applications present in handheld devices, automobiles, drones, IoT devices work efficiently by applying this protocol. The authentication time on the mobile workstation for parallel 10,000 nodes is around 0.7 s. Furthermore, the time between mobile workstation authentication to IoT mode with the Turbo compiler is 0.094 s, as presented, which is similar to the authentication time between IoT device 1 and IoT device 2. Various experiments prove the effectiveness of the autonomous protocol and its usage in a real-world scenario. In the future, GPU-based IoT device utilization for the parallelization of the exclusive challenge–response scheme will be utilized.

Author Contributions

Conceptualization, R.-K.S. and M.S.P.; methodology, R.-K.S. and M.S.P.; software, M.S.P.; validation, R.-K.S., M.S.P. and L.-C.C.; formal analysis, M.S.P.; investigation, R.-K.S. and M.S.P.; resources, R.-K.S., M.S.P. and L.-C.C.; data curation, M.S.P.; writing—original draft preparation, R.-K.S. and M.S.P.; writing—review and editing, R.-K.S. and M.S.P.; visualization, R.-K.S. and M.S.P.; supervision, R.-K.S. and M.S.P.; project administration, R.-K.S.; funding acquisition, R.-K.S. All authors have read and agreed to the published version of the manuscript.

Funding

The funding for this work is granted by Ministry of Science and Technology (MOST), Taiwan with project code “MOST 110-2221-E-029-001”.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

All the authors would like to thank the AI Center, Tunghai University, for making available the resources and support for the successful completion of this work. A special thanks to MOST for providing the required funding towards this proposal. Last but not the least, we appreciate the efforts of two reviewers for corrections and improvements within this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Strand, M.; Wiik, J.H. Security for Autonomous and Unmanned Devices: Cryptography and its Limits. Anti-Tamper Protective Systems for NATO Operations; NATO Science and Technology Organization: Brussels, Belgium, 2022; ISBN 978-92-837-2389-9.s. [Google Scholar]
  2. Sucasas, V.; Mantas, G.; Saghezchi, F.B.; Radwan, A.; Rodriguez, J. An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Comput. Secur. 2016, 60, 193–205. [Google Scholar] [CrossRef]
  3. Chow, M.C.; Ma, M.; Pan, Z. Attack models and countermeasures for autonomous Vehicles. In Intelligent Technologies for Internet of Vehicles; Springer: Cham, Switzerland, 2021; pp. 375–401. [Google Scholar]
  4. Pham, M.; Xiong, K. A survey on security attacks and defense techniques for connected and autonomous vehicles. Comput. Secur. 2021, 109, 102269. [Google Scholar] [CrossRef]
  5. Martínez-Cruz, A.; Ramírez-Gutiérrez, K.A.; Feregrino-Uribe, C.; Morales-Reyes, A. Security on in-vehicle communication protocols: Issues, challenges, and future research directions. Comput. Commun. 2021, 180, 1–20. [Google Scholar] [CrossRef]
  6. Aloqaily, M.; Hussain, R.; Khalaf, D.; Hani, D.; Oracevic, A. On the role of futuristic technologies in securing UAV-supported autonomous vehicles. In IEEE Consumer Electronics Magazine; IEEE: Piscataway, NY, USA, 2022. [Google Scholar] [CrossRef]
  7. Nikitas, A.; Parkinson, S.; Vallati, M. The deceitful connected and autonomous vehicle: Defining the concept, contextualising its dimensions and proposing mitigation policies. Transp. Policy 2022, 122, 1–10. [Google Scholar] [CrossRef]
  8. Çakal, K.; İlker, K.A.; Aydos, M. Cyber Security of Connected Autonomous Vehicles. Avrupa Bilim Ve Teknol. Derg. 2021, 32, 1121–1128. [Google Scholar] [CrossRef]
  9. Sun, X.; Yu, F.R.; Zhang, P. A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs). IEEE Trans. Intell. Transp. Syst. 2022, 23, 6240–6259. [Google Scholar] [CrossRef]
  10. Nayak, B.P.; Hota, L.; Kumar, A.; Turuk, A.K.; Chong, P.H.J. Autonomous Vehicles: Resource Allocation, Security, and Data Privacy. IEEE Trans. Green Commun. Netw. 2022, 6, 117–131. [Google Scholar] [CrossRef]
  11. Paruchuri, V.; Durresi, A.; Kannan, R.; Iyengar, S.S. Authenticated autonomous system traceback. In Proceedings of the 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004, Fukuoka, Japan, 29–31 March 2004; Volume 1, pp. 406–413. [Google Scholar] [CrossRef]
  12. Huang, C.; Lu, R.; Lin, X.; Shen, X. Secure automated valet parking: A privacy-preserving reservation scheme for autonomous vehicles. IEEE Trans. Veh. Technol. 2018, 67, 11169–11180. [Google Scholar] [CrossRef]
  13. Liang, W.; Ning, Z.; Xie, S.; Hu, Y.; Lu, S.; Zhang, D. Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inf. Sci. 2021, 579, 468–482. [Google Scholar] [CrossRef]
  14. Lapeyre, S.; Valette, N.; Merandat, M.; Flottes, M.L.; Rouzeyre, B.; Virazel, A. A lightweight, plug-and-play and autonomous JTAG authentication IP for secure device testing. In Proceedings of the 2022 IEEE European Test Symposium (ETS), Barcelona, Spain, 23–27 May 2022; pp. 1–4. [Google Scholar]
  15. Wickström, J.; Westerlund, M.; Pulkkis, G. Smart contract based distributed IoT security: A protocol for autonomous device management. In Proceedings of the 2021 IEEE/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Melbourne, Australia, 10–13 May 2021; pp. 776–781. [Google Scholar]
  16. Alkhalaf, S. A control-driven autonomous authentication scheme for peer-to-peer control systems assisted industrial Internet of things. Soft Comput. 2021, 25, 12175–12189. [Google Scholar] [CrossRef]
  17. Wang, M.; Rui, L.; Yang, Y.; Gao, Z.; Chen, X. A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network. In IEEE Transactions on Network and Service Management; IEEE: Piscataway, NJ, USA, 2022. [Google Scholar]
  18. Khan, M.Z.; Sarkar, A.; Ghandorh, H.; Driss, M.; Boulila, W. Information fusion in autonomous vehicle using artificial neural group key synchronization. Sensors 2022, 22, 1652. [Google Scholar] [CrossRef]
  19. Li, T.; Onodera, Y.; Nakayama, Y.; Hisano, D. Multi-Channel Authentication for Secure D2D using Optical Camera Communication. In Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2022; pp. 858–863. [Google Scholar] [CrossRef]
  20. Yang, J.; Gope, P.; Cheng, Y.; Sun, L. Design, analysis and implementation of a smart next generation secure shipping infrastructure using autonomous robot. Comput. Netw. 2021, 187, 107779. [Google Scholar] [CrossRef]
  21. Bilbao-Arechabala, S.; Jorge-Hernandez, F. Security Architecture for Swarms of Autonomous Vehicles in Smart Farming. Appl. Sci. 2021, 11, 4341. [Google Scholar]
  22. Jha, S.; Jha, N.; Prashar, D.; Ahmad, S.; Alouffi, B.; Alharbi, A. Integrated IoT-based secure and efficient key management framework using hashgraphs for autonomous vehicles to ensure road safety. Sensors 2022, 22, 2529. [Google Scholar] [CrossRef] [PubMed]
  23. Bagheri, H.; Noor-A-Rahim, M.; Liu, Z.; Lee, H.; Pesch, D.; Moessner, K.; Xiao, P. 5G NR-V2X: Toward connected and cooperative autonomous driving. IEEE Commun. Stand. Mag. 2021, 5, 48–54. [Google Scholar] [CrossRef]
  24. Rahmani, L.; Minarsch, D.; Ward, J. Peer-to-peer autonomous agent communication network. In Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, Online, 3–7 May 2021; pp. 1037–1045. [Google Scholar]
  25. Lounis, K.; Zulkernine, M. T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT. IEEE Access 2021, 9, 137384–137405. [Google Scholar] [CrossRef]
  26. Ko, T.; Ji, C.; Hong, M. AVoD: Advanced Verify-on-Demand for efficient authentication against DoS attacks in V2X communication. Secur. Commun. Netw. 2021, 2021, 2890132. [Google Scholar] [CrossRef]
  27. Duan, X.; Yan, H.; Tian, D.; Zhou, J.; Su, J.; Hao, W. In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method. In IEEE Transactions on Intelligent Transportation Systems; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar]
  28. Shahzad, A.; Gherbi, A.; Zhang, K. Enabling Fog–Blockchain Computing for Autonomous-Vehicle-Parking System: A Solution to Reinforce IoT–Cloud Platform for Future Smart Parking. Sensors 2022, 22, 4849. [Google Scholar] [CrossRef] [PubMed]
  29. Wu, B.; Wu, Q.; Ying, Z. GAP-MM: 5G-Enabled Real-Time Autonomous Vehicle Platoon Membership Management Based on Blockchain. Secur. Commun. Netw. 2022, 2022, 7567994. [Google Scholar] [CrossRef]
  30. Kumar, M.S.; Vimal, S.; Jhanjhi, N.Z.; Dhanabalan, S.S.; Alhumyani, H.A. Blockchain based peer to peer communication in autonomous drone operation. Energy Rep. 2021, 7, 7925–7939. [Google Scholar] [CrossRef]
  31. Pismenny, B.; Eran, H.; Yehezkel, A.; Liss, L.; Morrison, A.; Tsafrir, D. Autonomous NIC offloads. In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Virtual, 19–23 April 2021; pp. 18–35. [Google Scholar]
  32. Pardeshi, M.S.; Yuan, S.M. SMAP fog/edge: A secure mutual authentication protocol for fog/edge. IEEE Access 2019, 7, 101327–101335. [Google Scholar] [CrossRef]
  33. Schneier, B. Applied Cryptography; Wiley: Hoboken, NJ, USA, 1996. [Google Scholar]
  34. Easttom, C. Modern Cryptography: Applied Mathematics for Encryption and Information Security; McGraw-Hill: New York, NY, USA, 2016. [Google Scholar]
  35. Morales-Sandoval, M.; De-La-Parra-Aguirre, R.; Galeana-Zapién, H.; Galaviz-Mosqueda, A. A three-tier approach for Lightweight data security of body area networks in E-health applications. IEEE Access 2021, 9, 146350–146365. [Google Scholar] [CrossRef]
  36. Prakasam, P.; Madheswaran, M.; Sujith, K.P.; Sayeed, M.S. Low Latency, Area and Optimal Power Hybrid Lightweight Cryptography Authentication Scheme for Internet of Things Applications. Wirel. Pers. Commun. 2022, 126, 351–365. [Google Scholar] [CrossRef]
  37. Prakasam, P.; Madheswaran, M.; Sujith, K.P.; Sayeed, M.S. An enhanced energy efficient lightweight cryptography method for various IoT devices. ICT Express 2021, 7, 487–492. [Google Scholar]
  38. Thakor, V.A.; Razzaque, M.A.; Khandaker, M.R. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE Access 2021, 9, 28177–28193. [Google Scholar] [CrossRef]
  39. Sharma, G.; Kalra, S. A lightweight user authentication scheme for cloud-IoT based healthcare services. Iran. J. Sci. Technol. Trans. Elect. Eng. 2019, 43, 619–636. [Google Scholar] [CrossRef]
  40. Turkanovic, M.; Brumen, B.; Hölbl, M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 2014, 20, 96–112. [Google Scholar] [CrossRef]
  41. Wazid, M.; Das, A.K.; Shetty, S.; Rodrigues, J.J.P.C.; Park, Y. LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 2019, 19, 5539. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  42. Masud, M.; Gaba, G.S.; Choudhary, K.; Hossain, M.S.; Alhamid, M.F.; Muhammad, G. Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J. 2021, 9, 2649–2656. [Google Scholar] [CrossRef]
  43. Goworko, M.; Wytrębowicz, J. A secure communication system for constrained IoT devices—Experiences and recommendations. Sensors 2021, 21, 6906. [Google Scholar] [CrossRef] [PubMed]
  44. Bala, D.Q.; Maity, S.; Jena, S.K. Mutual authentication for IoT smart environment using certificate-less public key cryptography. In Proceedings of the 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS), Chennai, India, 4–5 May 2017; pp. 29–34. [Google Scholar]
  45. Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Reddy, A.G.; Yoon, E.J.; Yoo, K.Y. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 2017, 5, 3028–3043. [Google Scholar] [CrossRef]
  46. Alshawish, I.; Al-Haj, A. An efficient mutual authentication scheme for IoT systems. J. Supercomput. 2022, 78, 16056–16087. [Google Scholar] [CrossRef]
  47. Liu, X.; Zhao, M.; Li, S.; Zhang, F.; Trappe, W. A security framework for the Internet of Things in the future internet architecture. Future Internet 2017, 9, 27. [Google Scholar] [CrossRef] [Green Version]
  48. Park, N.; Kang, N. Mutual authentication scheme in secure Internet of Things technology for comfortable lifestyle. Sensors 2016, 16, 20. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  49. Porambage, Q.P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 2728–2733. [Google Scholar]
  50. Chang, C.-C.; Le, H.-D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357–366. [Google Scholar] [CrossRef]
  51. Sadhukhan, D.; Ray, S.; Biswas, G.P.; Khan, M.K.; Dasgupta, M. A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 2021, 77, 1114–1151. [Google Scholar] [CrossRef]
Figure 1. Autonomous device connectivity.
Figure 1. Autonomous device connectivity.
Sensors 22 07632 g001
Figure 2. Octet-based balanced tree.
Figure 2. Octet-based balanced tree.
Sensors 22 07632 g002
Figure 3. System model.
Figure 3. System model.
Sensors 22 07632 g003
Figure 4. Initial session key time analysis.
Figure 4. Initial session key time analysis.
Sensors 22 07632 g004
Figure 5. LCG-based session key generation: LCG 1 GCC (a) session key 1, (b) session key 2, (c) session key 3; LCG 2 Borland (d) session key 1, (e) session key 2, (f) session key 3; and LCG 3 Turbo (g) session key 1, (h) session key 2 and (i) session key 3.
Figure 5. LCG-based session key generation: LCG 1 GCC (a) session key 1, (b) session key 2, (c) session key 3; LCG 2 Borland (d) session key 1, (e) session key 2, (f) session key 3; and LCG 3 Turbo (g) session key 1, (h) session key 2 and (i) session key 3.
Sensors 22 07632 g005
Figure 6. Total time analysis for the LCG: (a) GCC, (b) Borland, and (c) Turbo.
Figure 6. Total time analysis for the LCG: (a) GCC, (b) Borland, and (c) Turbo.
Sensors 22 07632 g006
Figure 7. Protocol total time analysis and comparison within the (a) mobile workstation, (b) IoT device 1, and (c) IoT device 2.
Figure 7. Protocol total time analysis and comparison within the (a) mobile workstation, (b) IoT device 1, and (c) IoT device 2.
Sensors 22 07632 g007
Figure 8. Total time for PRNG-based nodes comparison with cryptography.
Figure 8. Total time for PRNG-based nodes comparison with cryptography.
Sensors 22 07632 g008
Table 1. Notation.
Table 1. Notation.
NotationMeaning
SSender
RReceiver
ASRegistration Server
a x Device Address/Unique Identity (UID)
t t l Validity of the message/time to live
t x Timestamp of x
P K x Public key of x
S K x Private key of x
λ x Transition taken by x
E x Encryption performed by x’s public key
D x Decryption performed by x’s private key
K x , y Session key from x to y
M ^ x Malicious user x
XOR bitwise operator
Table 2. System configuration.
Table 2. System configuration.
SystemMobile Workstation (Laptop)IoT Device 1IoT Device 2
ModelMacBook ProRaspberry Pi 3BRaspberry Pi 3B+
ProcessorIntel Core i7 @ 2.6 GHzBroadcom Quad Core @ 1.2GHz Broadcom, Cortex-A53 (ARMv8) 64-bit SoC @ 1.4GHz
Main Memory16 GB1 GB SDRAM1GB LPDDR2 SDRAM
Programming LanguagePython 2.7 (Libraries: random, hashlib, datetime, sys, pandas, base64, and getnode.)
Table 3. LCG-based mobile workstation to IoT device 1 authentication time.
Table 3. LCG-based mobile workstation to IoT device 1 authentication time.
LCGGCCBorlandTurbo
Total Time (s)0.141000.110000.09400
Table 4. LCG-based IoT device 1 to IoT device 2 authentication time (s).
Table 4. LCG-based IoT device 1 to IoT device 2 authentication time (s).
LCG/KeySession Key 1Session Key 2Session Key 3Total Time
GCC0.5489909650.0004410740.0019738670.551431894
Borland0.0897588730.0010001660.001901150.092696905
Turbo0.414449930.0004441740.0018851760.41680479
Table 5. Protocol computation cost comparison.
Table 5. Protocol computation cost comparison.
ReferenceUser DeviceGatewaySensor NodeTotal
Cloud–IoT [39] 11 C C h 7 C C h 5 C C h 23 C C h
Ad hoc wireless sensors [40] 7 C C h 5 C C h 7 C C h 19 C C h
Edge–IoT [41] 9 C C h 15 C C h 8 C C h 32 C C h
IoT devices [42] 4 C C h 3 C C h 2 C C h 9 C C h
Autonomous protocol 2 C C h + 3 C C C N . A . 2 C C h + 3 C C C 4 C C h + 6 C C C
Table 6. Performance metric comparison of IoT security protocols.
Table 6. Performance metric comparison of IoT security protocols.
Performance Metric[43][44][45][46][47][48]Autonomous Protocol
Number of messages exchanged89361174
Security of message exchangedY--YNYY
IoT Device computation efficiency NNNYNNY
Lightweight cryptographyNYNYNNY
Autonomous authentication NNNNNNY
Automated key exchangeY_YY-NY
High-range authentication statisticsNNNNNYY
Infrastructure independentNNNNNNY
Table 7. Computational overhead in IoT schemes.
Table 7. Computational overhead in IoT schemes.
ReferenceUser DeviceIoT DeviceGatewayTotal Time (ms)
[49] 8 T H + 4 T E C M = 70.96 10 T H + 11 T E C M = 191.3 5 T H + 8 T E C M = 141.6 403.86
[45] 1 T f e + 5 T H + 5 T E C M = 104.2 3 T H + 4 T E C M = 70 4 T H + 5 T E C M = 86.78 260.98
[50] 9 T H + 2 T E C M = 37.08 5 T H + 2 T E C M = 35.8 7 T H = 2.24 75.12
[51] 2 T H + 1 T E C M + 2 T S E / D = 28.94 . 1 T H + 1 T S M + 2 T S E / D = 28.62 2 T H + 4 T S E / D = 23.04 80.6
Autonomous protocol 2 T H + 3 T S E / D = 4.15 2 T H + 3 T S E / D = 11.22N.A.15.37
Table 8. Total time for the protocol completion.
Table 8. Total time for the protocol completion.
ReferenceTotal Time (s)
Efficient mutual authentication scheme in IoT [46]2.01304
Two-phase authentication protocol in WSN [49]27.27
Autonomous protocol—mobile workstation to IoT device0.09400
Autonomous protocol—IoT device 1 to IoT device 20.092696905
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sheu, R.-K.; Pardeshi, M.S.; Chen, L.-C. Autonomous Mutual Authentication Protocol in the Edge Networks. Sensors 2022, 22, 7632. https://doi.org/10.3390/s22197632

AMA Style

Sheu R-K, Pardeshi MS, Chen L-C. Autonomous Mutual Authentication Protocol in the Edge Networks. Sensors. 2022; 22(19):7632. https://doi.org/10.3390/s22197632

Chicago/Turabian Style

Sheu, Ruey-Kai, Mayuresh Sunil Pardeshi, and Lun-Chi Chen. 2022. "Autonomous Mutual Authentication Protocol in the Edge Networks" Sensors 22, no. 19: 7632. https://doi.org/10.3390/s22197632

APA Style

Sheu, R. -K., Pardeshi, M. S., & Chen, L. -C. (2022). Autonomous Mutual Authentication Protocol in the Edge Networks. Sensors, 22(19), 7632. https://doi.org/10.3390/s22197632

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop