Abstract
Cyber-Physical Systems (CPS) connected in the form of Internet of Things (IoT) are vulnerable to various security threats, due to the infrastructure-less deployment of IoT devices. Device-to-Device (D2D) authentication of these networks ensures the integrity, authenticity, and confidentiality of information in the deployed area. The literature suggests different approaches to address security issues in CPS technologies. However, they are mostly based on centralized techniques or specific system deployments with higher cost of computation and communication. It is therefore necessary to develop an effective scheme that can resolve the security problems in CPS technologies of IoT devices. In this paper, a lightweight Hash-MAC-DSDV (Hash Media Access Control Destination Sequence Distance Vector) routing scheme is proposed to resolve authentication issues in CPS technologies, connected in the form of IoT networks. For this purpose, a CPS of IoT devices (multi-WSNs) is developed from the local-chain and public chain, respectively. The proposed scheme ensures D2D authentication by the Hash-MAC-DSDV mutual scheme, where the MAC addresses of individual devices are registered in the first phase and advertised in the network in the second phase. The proposed scheme allows legitimate devices to modify their routing table and unicast the one-way hash authentication mechanism to transfer their captured data from source towards the destination. Our evaluation results demonstrate that Hash-MAC-DSDV outweighs the existing schemes in terms of attack detection, energy consumption and communication metrics.
Keywords: Internet of Things (IoT), security, Hash-MAC-DSDV, Device to Device authentication, Local and public chains
1. INTRODUCTION
Internet of Things (IoT) is the latest and emerging trend in the current era of Information and Communications Technology (ICT). IoT has numerous applications in the real world that include disaster management, military surveillance, healthcare, smart farming, and industrial automation among others [1–3]. The network architecture of IoT is mainly based on distributed and centralized communication infrastructures [4]. In the distributed infrastructure, the clients directly extract data from the deployed sensor devices, while in the centralized infrastructure, the sensor devices in the deployed area process the data collected via a concerned base station.
For the IoT connectivity, multiple Wireless Sensor Networks (WSNs) collaborate to deliver services to the end users. It is therefore essential for these networks to manage the identity of sensor devices in a secured environment [5]. In most cases, the deployment of WSN and IoT infrastructure is challenging, so Device-to-Device (D2D) authentication is a viable option in these scenarios. In the existing literature, the D2D authentication schemes used for IoT are mostly used in a centralized fashion [6], [7]. However, in a centralized D2D authentication, legitimate sensor devices rely on third parties, e.g. authentication servers, for their verification and network participation. This increases the likelihood of failures since all participating devices depend on a single point for their authentication. The distributed or decentralized authentication resolves this issue in these networks. Authentication of IoT networks connected in the form of multi-WSNs is an emerging decentralized approach used to address the issues associated with a centralized authentication [8]-[11].
The interconnection of multi-WSNs brings numerous challenges in terms of network security, architecture, lifetime, and communication metrics, due to its continuous emergence [14], [15], [16]. Data confidentiality and integrity are the crucial aspects of IoT networks because they ensure the legitimacy of a network. Therefore, D2D authentication of IoT networks interconnecting multi-WSNs is mainly focused on the topological structure and routing protocols to create a secured communication infrastructure. The existing techniques use the peer-to-peer authentication through nodes, servers or base stations, which is mostly based on centralized communication. In addition, the centralized communication of these sensitive networks is not reliable because failure of a centralized device may disrupt the operation of interconnected sites and may create network overhead in terms of shifting complete load to the neighboring servers or controllers, which degrades the network performance. To resolve the authentication issue in these networks, we have proposed a decentralized approach in this research, which is effective in terms of various authentication modes. The main contributions of this research are as follow.
A. Research contributions
In this paper, we propose a Hash-MAC based mutual authentication scheme for Cyber-Physical Systems (CPS) with embedded sensor devices connected in the form of multi-WSNs topology of IoT. Unlike the existing studies, we focus on decentralized authentication, where a D2D approach is adopted to verify the authenticity of participating devices. Moreover, the proposed model uses a hash function with MAC addresses to create a secured authentication key for the deployed IoT devices. We have developed the IoT network infrastructure by interconnected multi-WSNs, which are further built into various components like base station (BS), cluster head (CH) and ordinary sensor devices. The legitimate devices of the network register their MAC addresses in a local chain with a concerned CH node followed by BS in the public chain. In the next step, the BS broadcasts the MAC addresses of registered devices in the public chain by adding a hash function. Likewise, BS(s) connected in the public chain receives this information and forwards it to the local chain through CH nodes followed by legitimate devices. Consequently, the embedded devices of CPS in the local chain update their routing table and follows this information for unicast communication or one-way authentication in the network.
The major contributions of our scheme are as follows:
To reduce the computation and communication costs, the CH nodes and BS(s) have been provided with sufficient power and control to manage the MAC address registration of legitimate devices, hash functioning and route advertisement for creating a congestion-free communication environment with a better lifespan of legitimate devices.
The authenticity of participating devices is ensured by continuously advertising their authentication information in the local and public chain. In addition, the legitimate devices in the local chain follow the advertised information with a one-way Hash MAC authentication process to ensure the legitimacy of requesting devices by matching Hash MAC with their MAC address table.
The D2D authentication is achieved by utilizing minimal network resources in our proposed model, because most of the computation is performed by BS and CH nodes, which improve the result statistics in terms of comparative metrics over the existing schemes. In addition, the network overhead is minimized up to a remarkable level in terms of throughput, packet lost ratio, and network lifetime, because the participating device follows only the advertised information of the concerned CH node and BS, respectively, to send their data from source to destination.
Beside that, we want to acknowledge that our proposed model presents a secured communication environment with robust MAC address registration to ensure their legitimacy. Thus, the proposed HASH MAC scheme applies to any IoT application that has legitimate device authentication and secure communication requirements e.g. industrial automation, military, internet of vehicles (IoV), agriculture, smart homes etc. The rest of the paper is organized as follows. Section 2 presents the related work followed by the proposed model of authenticating the IoT devices in CPS in Section 3. Section 4 presents the formal security analysis followed by experimental results in Section 5. Finally, section 6 concludes our paper.
II. LITERATURE REVIEW
Wireless Sensor Networks (WSNs) and Internet of Things (IoT) are susceptible to various security threats, due to the deployed environment and their dynamic communication behavior. Therefore, security of these networks is considered as primary concerns for research community that needs to be implemented at the deployment stage [12] [13]. In order to combat security threats faced by these networks, the limited resources and critical applications of IoT require the research community to devise new techniques or modify existing techniques. Therefore, the literature suggests different schemes for countering various type of attacks faced by these networks.
Khalid et al. [14] proposed a decentralized authentication scheme for IoT-based communication infrastructure of multi-WSNs, where they used fog computing as a public authentication process to verify the legitimacy of participating sensor devices. Tonyali et al. [15] proposed a privacy preserved protocol for wireless mesh networks of Smart Grid to collect data in a secured communication environment. Moreover, they used Fully Homomorphic Encryption (FHE) and Secure multiparty Computation (SMPC) techniques in their model to aggregate data in a secured communication environment. A comprehensive survey of secure services composition and data aggregation for WSNs was carried out by Aloqaily et al. [16]. Baker et al. [17] proposed the toolbox authentication scheme for blockchain wireless sensor networks. In the proposed model, they used a key feature for the authenticity and identity of communicating sensor devices. Moreover, they used the signature and cryptographic approaches in their cloud-based infrastructure of blockchain wireless networks. Rathee et al. [18] proposed a blockchain authentication scheme for autonomous vehicular communication infrastructure.
The challenges associated with the security of IoT network communication infrastructure was expansively overviewed by Tariq et al. [19] in their survey article. Moreover, the authors comprehensively discussed the well-established approaches to counter these threats in an operational network. However, the survey was adopted specifically against fog computing IoT network communication environment. The two-factor lightweight privacy-preserving authentication scheme for IoT devices connected in the form of multi-WSNs was proposed by Gope et al. [20]. The authors used the physical functionality of IoT devices as an authentication factor to validate the trustworthiness of cooperating IoT devices. However, later on, their scheme was flawed, because every time the assessment of the physical properties of IoT devices is not possible. Feng et al. [21] was proposed the lightweight attestation and authentication scheme for the IoT network. They used the memory and clone-able functions of sensor devices with the help of software-define infrastructure to verify the authenticity of participating devices in the network. The CreditCoin based authentication scheme for blockchain vehicular wireless sensor networks was proposed by Li et al. [22]. The limitation of this scheme was its specific system implementation with a complex model.
Cui et al. [23] used a deep learning technique to identify malware variants in the deployed WSNs. In the proposed scheme, the authors used malicious codes in the conversion of grayscale images to verify the legitimacy of their scheme. The scheme was effective to identify malware variants in the network, but it was limited to homogeneous networks, this reduces its usefulness in actual deployment. Aitzhan et al. [24] proposed a third party decentralized authentication scheme for smart grid energy system. Moreover, the authors used blockchain technology infrastructure in their model with multi-signature anonymous encryption message streams to ensure the security of deployed IoT. A detailed survey on blockchain technology in coordination of a centralized approach to overview the security performance of deployed WSNs infrastructure is carried out by Salman et al. [25]. Cui et al. [26] was proposed the ensemble bat algorithm (BA) approach for large scale optimization problems by integrating ideas. Edge Chain named blockchain communication environment for IoT networks was proposed by Pan et al. [27]. The basic idea of the proposed model was to integrate the blockchain of WSNs and link them through edge cloud for secure information exchange. The three-tier security architecture for IoT networks was suggested by Bao et al. [28]. The authors used the blockchain layer, authentication layer, and application layer in combination to resolve the security issues of IoT networks. Reference [29] introduces the Certificateless Signcryption Tag Key Encapsulation Mechanism (eCLSC-TKEM) to settle the preservation issue of city-based drone communication infrastructure. The recommended prototype was proficient to validate the authenticity of cooperating devices in terms of relationships such as one-to-one authentication, one to many, and many to one.
A. Limitation of Existing Schemes.
CPS is extremely vulnerable to a variety of internal and external attacks, due to their unrestricted area deployment and complex communication activities. As a consequence, efficient use of CPS networks enriches their productivity and adaptability. CPS is made up of hundreds of thousands of sensor nodes that are exposed to numerous forms of attacks, i.e. jamming, black hole attacks, Sybil attacks, server-side attacks, and so on. Various methodologies had been demonstrated in the recent past to mitigate these types of attacks and resolve the authentication problem in CPS, but the majority of them are specific to the communication environment, system deployment, or software relevancy.
The following are some of the major disadvantages correlated with the current literature:
The majority of the authentication approaches discussed in the literature are difficult to execute in a real deployment, due to their complexity.
Some of the discussed techniques are successful for unique network attacks, which limits their use in real-world applications because CPS is susceptible to numerous network attacks.
Some present literature employs a convoluted authentication mechanism, which adds to network overhead and reduces network capability in terms of computation and communication costs.
III. PROPOSED METHODOLOGY: HASH-MAC-DSDV SCHEME
A. Assumptions and System Model
Let us assume an IoT network of sensor devices, CH nodes, and BSs. The sensor devices have limited resources in terms of storage, transmission, processing, and onboard power. Such resources require efficient utilization for better results and prolonged network lifetime. To this end, in our proposed model, most computation is performed by CH nodes and BS(s) to maximize the lifetime of sensor devices.
The sensor devices are components of CPS connected in the form of IoT networks. Moreover, these devices are deployed at a designated location to collect and process information in the network according to their assigned task. The CH nodes process the gathered information of sensor devices in the local chain and transmit it to the BS(s) for further processing. Each CH is a special device with higher processing and memory capabilities, as well as onboard power. Therefore, they process the data in an effective way in the local chain as well as in the public chain associated with the BS. The BS connects multi-WSNs of CPS to form a heterogeneous network. Moreover, the BS works as a point of interest for sub-networks, because it manages the sub-networks in terms of security and data processing.
Figure 1 represents the architectural diagram of our proposed approach. The connectivity between legitimate devices and cluster heads is shown by light blue lines whereas, the green lines show intra-connectivity among the BSs, while the orange lines represent the connectivity of BSs and network cloud. The black lines in the figure show the D2D communication among different clusters. The sensor devices in each cluster gather data according to their designated task and process it via the concerned CH in the network. Similarly, each CH node uses an associated BS to transmit the gathered information to remote destinations within the network. Moreover, as shown in the figure, the legitimate devices of one cluster can communicate with another cluster’s device, if they verify the security parameters of the proposed model by matching the MAC addresses. The multi-WSNs of CPS, as shown in the figure, establish a heterogeneous IoT network.
Fig. 1:
Architecture overview of local and Public chain of our scheme
B. Authentication Mechanism
The authentication mechanism adopted in the proposed model includes the following phases: initialization, registration, and authentication.
1. Initialization and Registration Phases:
The initialization phase is mainly concerned with the BSs as they initiate the Hash-MAC-DSDV mutual authentication scheme on sub-networks using the local and public chain connectivity. All the participating sub-network devices first register their MAC addresses with a BS in an offline phase within the public chain va a concerned CH (local chain). The BS adds MD5 Hash function with the registered MAC address and broadcasts it within the public chain following the Hash-MAC-DSDV routing scheme. The CH connected with the BS passes on this information to the local chain, where the legitimate devices update their routing table according to the advertised information. Similarly, the connected devices in the network follow their routing table information to transmit data from source to destination via concerned CH and BS. However, before transmission, a one-way-authentication process is carried out to verify the legitimacy of each requesting device by matching its MAC address in the device MAC table, CH, or BS, respectively.
Theorem-1:
An ordinary device Di generates a MAC address registration request with concerned Sj through CH, where Dj is the specified BS. Di communicate in the network, if Di MAC address ∈ (Dj) public chain.
Proof:
Let us assume that an attacker device Ak generates a registration request directly with BS by sending its MAC address. Dj checks the MAC address of requesting device by triggering a lookup with connected CH or local chain network. After, a through check, the MAC-address of Ak did not match with any local chain of Sj. Hence, the MAC address of Ak cannot be registered by concerned Dj in the public chain. Moreover, the registration request of Ak is denied by Dj. Conversely, if the legitimate device Di generated a registration request with the concerned Dj through CH or local chain, then its MAC address will be verified successfully in terms of Di ∈ member(Dj,i), where the ith term in Dj,i denotes the total number of registered MAC addresses of legitimate devices in Dj, which is further classified as i=(1,2,3,4,.......n-1), in our proposed multi-WSNs network. Hence, Dj registers only those devices that approached through local chain or CH in the initial phase of registration (offline phase).
Algorithm 1 describes the registration phase of the proposed model. Initially, Di devices generate RREQ messages to register their MAC addresses with Dj that checks the local chain of requesting device. If the local chain (CH) ∈ Dj, then, the Dj registers the MAC addresses of requesting devices, else they deny the registration request of these devices. Likewise, the Dj advertises the information of registered devices in public chain through connected Dj and local chain through CH nodes for other legitimate connected devices. All connected devices in the local chain and public chain update their routing table for communication in the network. Finally, Dj represents the list of registered MAC Addresses. Please note that only registered
Algorithm 1.
Registration of ordinary devices Di with Djvia the specified CH
Require: Registration of legitimate Di with concerned Dj. |
Ensure: Registration of legitimate Di in the local and public chains. |
1: Di generate registration RREQ with Dj |
2: Di forward registration RREQ ← through CH |
3: Dj ← Receives Di RREQ through CH, where, i=1,2,3......n-1 |
4: for (i=0; i = n-1; i++) |
5: Dj check local chain (CH) ← of Di |
6: if |
7: Di RREQ ∈ local chain of Dj |
8: then, |
9: Dj registers Di MAC address in their MAC table |
10: Else |
11: Dj Denies Di registration request |
12: end if |
13: Dj broadcast the registered MAC address in the public chain |
14: CH ← Share information of public chain in local chain |
15: ordinary devices update their routing table according to Dj |
16: return : List of registered Di devices MAC addresses |
devices can process their request through concerned CH in the public chain.
The flow chart of Figure 2 depicts the registration process of our proposed Hash-MAC-DSDV algorithm. The participating devices Di share their MAC addresses with Dj through a CH, which we call local chain in the proposed model. However, once Dj receives a registration request from a CH for an ordinary device Di, the Dj registers the MAC address of requesting Di and uses the MD5 hash algorithm to broadcast the MAC address of Di in the network via other Dj interconnected small WSNs, consequently, the Dj further broadcast this information to connected CH nodes in the local chains. When the participating devices in the local chain receive the CH broadcast message, they update their routing table. Similarly, these devices follow their routing information to transmit messages in the network and make authentication possible between D2D in the local chains, device to CH, and CH to Dj by means of the proposed scheme. To elaborate further, the devices connected in the local chain follow their routing table information to forward or receive communication requests. Moreover, these information contains the adjacent devices hop-count, distance, and MAC address etc. which ensures the effectiveness of proposed scheme. Likewise, the Dj maintains a record of the local chains in terms of clusters (CH) with their Di devices MAC address information and the CH maintains a record of legitimate devices. Consequently, the connected Di of the network follows the rule of Hash-MAC-DSDV protocol for communication in the network.
Fig. 2:
Legitimate devices registration step by step process in the proposed model
2). Authentication Phase:
Let us assume that a legitimate device Di, where Di ∈ local chain of the CH, initiates an authentication request with Dj to process the collected data in the public chain. Di processes its data through the local chain using the CH, which checks and matches the requesting device ID in terms of MAC addresses in their MAC table to verify its authenticity in the local chain. If MAC address of (Di) ∈ CH list, then the CH processes the Di’s request for further processing in the network. Once Dj receives Di’s request for communication in the network, Dj matches Di’s MAC address in its routing table by following the public chain mechanism for the specified CH (local chain). Dj matches the requesting Di’s MAC address in its routing table, if Di’s MAC address ∈ Dj MAC address list for a specified local chain, Dj allows Di to communication through the public chain. Hence, Dj verifies the authenticity of requesting Di devices and processes their information in the network.
Figure 3 illustrates the step by step authentication for a device registered in the network. The proposed model works on the basis of chains: local and public. Similarly, a number of small WSNs of CPS are interconnected in the network to form a heterogeneous IoT network. Di initiates a message exchange request in the network. Di needs an authentication in the local chain to move forward in the public chain. Therefore, Di’s message contains information such as device ID and MAC address. This information is checked by the CH in the local chain to verify its authenticity. The Di’s message is verified by the CH via matching its MAC address in the local chain. If Di’s MAC address ∈ CH’s MAC address list, then the CH successfully authenticates Di and processes Di’s request in the public chain. Likewise, Di’s message request goes to the public chain, where Dj checks and matches the MAC address of Di in its MAC address table. If Di’s MAC address ∈ Dj MAC address table, the authentication of Di is completed successfully and it is allowed to communicate in the network.
Fig. 3:
Authentication Flow chart diagram of Hash-MAC-DSDV protocol
C. Device to Device Authentication in Local Chain
The proposed model is effective in D2D authentication because all the MAC addresses of legitimate Di are broadcast by the respective Dj in the public chain. The connected CH nodes pass this information to the local chain and the participating devices in the local chain update their routing table according to the advertised information of Dj. The devices follow their routing information to communicate with neighboring devices or process their collected data through these devices and CH nodes, if they are at the next hop.
Let us assume that Di devices generate an authentication or message exchange request with another Di ∈ Dn−1, where the ith term represents the number of legitimate devices in the local chain such that, i=(1,2,3,4,......,n-1) devices. The receiving device checks the MAC address of Di in its MAC address table. If Di’s MAC address ∈ Dn−1 MAC address list, the receiving device will process Di request in the local chain. Otherwise, Dn−1 device denies Di’s authentication request and disseminates a caution message in the network to declare the appearance of a spiteful device Ak).
D. Authentication of Attacker Devices
The authentication of an attacker device in an operational network ensures the reliability and performance of a protocol or security scheme. Therefore, the proposed Hash-MAC-DSDV scheme is effective in terms of identifying malicious devices in the network.
1. ) Authentication of attackers in the local chain in terms of D2D:
Let us assume that an attacker Ak initiates an authentication request. Ak’s request is received by a legitimate device Di in the cluster (local chain), where the ith term i= (1,2,3,4,......,n1), represents the legitimate devices in the cluster. Once Di receives Ak’s message request, it matches the MAC address of Ai in their MAC address table. Likewise, if Ak’s MAC address ∈/ Di’s MAC address, Di denies Ak’s authentication request in the local chain and avoid attacks in the local chain.
2. ) Authentication of attackers in the local chain by CH:
It is a major concern when Ak initiates a message request with a CH node in the local chain to compromise its security. However, in case of direct communication with CH nodes, when a CH receives Ak’s message request, it checks the MAC address of Ak in its MAC address list. If Ak’s MAC address ∈ CH MAC address list, the CH allows Ak to communication in the network. Otherwise, CH denies Ak’s request and advertises an alarm message to notify others about the existence of an attacker in the network.
3. ) Authentication of attackers in the local chain by Dj:
There is a possibility that Ak will compromise the security of the public chain by communicating directly with a Dj. The proposed model is effective to combat a direct connectivity request from Ak to Dj through accurate identification. Once the Ak generates an authentication request to Dj directly in public chain, Dj matches Ak’s MAC address in their MAC address list. If Ak’s MAC address Dj MAC address list, Ak is accurately identified and detected by Dj. At this stage, Dj broadcasts an alarm message in the local chain through CH nodes to acknowledge the existence of a malicious device in the network’s public and local chains.
IV. EVALUATION
Table I, variables have been used in the OMNeT++ simulation setup to assess the viability of the Hash-MAC-DSDV scheme. Although, we have evaluated our scheme in a simulation environment, the results of OMNeT++ are an approximation of the real environment in terms of operation. Throughout our simulation study, we tested numerous criteria for the proposed scheme to check its feasibility for the real-world implementation. Moreover, the results are validated through formal safety analysis in the context of different threats to the network. We computed the computation and communication cost, packet losses, and latency, respectively. In addition, we compared the energy consumption of Hash-MAC-DSDV to the legacy DSDV routing protocol. A description of our findings is presented in the following subsections.
TABLE I:
Parameters used for Hash-MAC-DSDV setup.
Parameter Description | Value of the parameters |
---|---|
Routing Protocol | Hash-MAC-DSDV |
Initial Energy of devices (Ei) | 60,000 mAh |
Simulation Tool/Environment | OMNeT ++ |
Energy Consumption during Normal state | 1.03 mW |
Total Number of Cluster Heads in CPS | 15, 30, 50, 60, 90 |
Energy Consumption during transmission | 70.1 mW |
Total Number of IoT Devices in CPS | 300, 600, 1000, 1500, 2000 |
Energy Consumption during Sleep mode | 0.50 μ W |
Total Number of Base Stations in CPS | 3, 6, 10. 15, 20 |
Transmission interval of devices | 14 μSec |
Energy Consumption during reception | 44.6 mW |
Residual Energy of a device (Er) | Ei - Ec |
Network Traffic type | UDP |
Packet Size | 128 Bytes |
Communication Pattern | broadcast/ unicast |
A. Formal Security Analysis of Hash-MAC-DSDV
In this section, we first evaluate different threats and analyze our scheme by comparing against the existing ones. A brief overview of formal security analysis is shown in Table II.
TABLE II:
Statistical results analysis for different security threats
Type of Attack | Our Scheme | [14] | [20] | [27] |
---|---|---|---|---|
Eavesdropping Attack | Yes | Yes | No | Yes |
Sensing Device Impersonate Attack | Yes | Yes | Yes | Yes |
Sybil Attacks | Yes | No | Yes | No |
Spoofing Attacks | Yes | Yes | No | Yes |
Denial of Service Attack (DoS) | Yes | Yes | Yes | No |
Spoofing Attacks | Yes | Yes | Yes | Yes |
Perfect forward and backward secrecy | Yes | Yes | No | Yes |
Base Station (BS) impersonate Attacks | Yes | Yes | Yes | Yes |
1. Eavesdropping Attack:
In an eavesdropping attack, an adversary Ak steals sensitive data transmitted through an insecured communication channel. Assume that a legitimate device Di ∈ Dn−1 transmits data through the local chain. Ak tries to capture this data over the communication channel and access the information. In our model, Ak needs 2128 iterations to access a message digest and 2512 iterations to access the block of messages, which is virtually impossible for sensor devices due to their limited computing and memory resources, as well as onboard power. Therefore, the Hash-MAC-DSDV scheme efficiently safeguard against the eavesdropping attack.
2. ) Sensing Device Impersonation Attack:
In this form of attack, Ak impersonates as a valid device on the network. However, our Hash-MAC-ASDV scheme is effective against this attack because the one-way authentication model does not allow Ak to usurp the security of an individual legitimate device in the network. Let us assume that Ak initiates an authentication request to Di in its close vicinity. Once Di receives Ak’s authentication request, it checks the MAC address of Ak in its MAC address list. If Ak’s MAC address Di MAC-Address list, Di will not respond to Ak’s authentication request. In other words, Di will deny Ak’s authentication request in an operational network to avoid impersonation attack.
3. ) Sybil Attacks:
Our Hash-MAC-DSDV scheme is highly resilient against Sybil attack, since each device has a distinct MAC address recorded in the local chain as well as in the public chain. Therefore, the usurpation of the protection of the Di device needs to define its MAC-Address with MD5 hash function, but sensor device as an adversary has limited resources to identify the MAC address of legitimate devices by following 2128 iterations. Therefore, our model protects against Sybil attacks.
4. ) Spoofing Attacks:
Spoofing attack is another disruptive assault intended to compromise the security of a network. Assume that Ak tries to spoof the MAC address of Di by launching an attack. For that, Ak needs to know the MAC address of Di. Likewise, Ak needs to know the MAC address of any Di Dn−1 in the network. Consequently, Ak will need to hijack an individual device (CHi or Dj) to get the MAC address of a legitimate device. This is not possible in the proposed model, due to D2D, local chain, and public chain authentication. The authentication request of Ak in the proposed scheme will always be identified successfully to prevent spoofing attacks against the deployed network.
5. ) Denial of Service Attack (DoS):
To elaborate on our scheme against DoS, assume that Ak launches a DoS attack towards Di in the network. Once Di receives Ak’s first message request, it matches the MAC address of Ak in its registered MAC address list. If the MAC address of Ak Di’s MAC address list, Di will deny Ak’s request and blacklist Ak in its directory.
6. ) Forward and backward secrecy:
Hash-MAC-DSDV can offer forward and backward secrecy because the legitimate Di, CHi and Dj react only to those devices listed in the local and the public chains. These devices first match the MAC addresses of the requesting devices in their MAC address list. Consequently, the tests of our scheme against this type of attack allow access to only legitimate devices.
7. ) Base Station (BS) Impersonation Attacks:
The Hash-MAC-DSDV scheme also showed effectiveness against BS impersonation attacks. Assume Ak tries to communicate directly with BS and compromise its security. Ak generates communication request with the nearest Dj. Upon reception of Ak message request, Dj checks the MAC address of requesting device in its local chain MAC-Address list. The MAC address of Ak Dj local chain MAC-Address list. So, Dj will identify Ak successfully and will avoid BS impersonation attacks in the network. Therefore, our scheme has better results against the impersonation attack.
B. Computation Cost Comparative Analysis
The computation results can easily be evaluated from the proposed model execution time in terms of processing, energy consumption and memory utilization. The operation of the model, furthermore, depicts that most of the computation is performed at the cluster head and base station, which have higher processing power. Similarly, upon registration of MAC addresses at the base station Dj, each Dj advertises the information in the public chain followed by CH nodes in the local chain. Consequently, the legitimate devices in the local chain update their routing table according to CH advertised information. The legitimate devices follow routing table information to transmit their collected data in the network. However, this is a one-way process, because the legitimate devices transmit their data in a unicast fashion following their routing table information, which not only minimizes the energy consumption, but also minimizes the calculation or processing of legitimate devices and as a whole, improves the network performance. Therefore, the computation cost of the proposed model is better than the existing schemes of [14], [20], and [27]. Khalid et al. [14] scheme has high computation because the next hop update is the responsibility of an individual participating device. Therefore, it consumes more energy with network overhead and higher computation cost. Likewise, Gope et al. [20], scheme has also higher computation cost in comparison to our scheme, because they used two factor authentication model in their scheme with physical assessment of IoT devices. Moreover, the participating devices of the network updated their routing table after define interval of time, which also creates contention with higher computation cost. The complex model implementation of [27] increases its computation cost in an operational environment.
C. Communication Cost Comparative Analysis
The communication cost is another important aspect to consider while designing a new protocol or modifying existing protocols. Therefore, the communication cost of any IoT network determines its capacity, performance, and reliability. The communication cost of the proposed model shall be assessed with a pricing structure based on the following statement:
The identity of legitimate device as its MAC address
MD5 Hash function with message digest
Time stamp for key sharing via CH and base station
Authentication procedure
The simple registration and authentication mechanism of legitimate devices in the proposed model minimizes the communication costs up-to significant level in the presence of rivals schemes. Moreover, the rival schemes of [14], [20], and [27], use an authentication process between BS/Edge devices or device to exchange information in the network, every time. Keeping in view, the authentication procedure adopted by the existing schemes, our proposed model has the simplest authentication process with minimal resource consumption and better results.
D. Comparative Analysis on the Accuracy of Threat Detection
The proposed model was assessed with its competitor schemes based on accurate threat detection in an operational network. The Hash-MAC-DSDV scheme’s utmost objective is to detect and report malicious activity in the deployed network. Although the competitor schemes resolve the legitimate device authentication issue to some extent, they were flawed in addressing issues like D2D, device-to-CH, device-to-BS, and CH-to-BS authentication at the same time. In our scheme’s simulation environment, we have evaluated the proposed model for aforementioned attacks. Moreover, we have also launched attacks on legitimate devices, CH(s) and BS(s) to verify the effectiveness of our scheme. The detection rate of malicious device in the proposed model was 98.2%, which showed an average 15% improvement over the existing schemes. Likewise, during simulation analysis, we have changed the number of malicious devices, fake packets, target area such as participating devices, CH nodes, and BS(s) to overview our scheme’s reliability. Overall, the performance of the proposed model was significant compared to existing rival schemes to combat malicious attacks in IoT networks connected in the form of multi-WSNs. Results for our scheme and other schemes are presented in Figure 4. In addition, in Figures 5, 6, and 7, the results for individual network components such as devices, CH and BS against malicious activity in an operating network are presented.
Fig. 4:
Threat detection comparative statistical analysis
Fig. 5:
Statistical analysis of legitimate devices to detect malicious attacks
Fig. 6:
Statistical analysis of CH to detect malicious attacks
Fig. 7:
BS attacks detection statistics
E. Energy Consumption
Sensor devices are sensitive and have limited resources memory, and energy, therefore, efficient utilization of these devices increases its productivity in terms of network lifespan. Therefore, while designing Hash-MAC-DSDV mutual authentication scheme for multi-WSNs connected in the form of IoT network, we considered limited resources of sensor devices. The proposed model’s energy consumption was evaluated with ordinary DSDV protocol in simulation environment. The results statistics captured during Hash-MAC-DSDV protocol simulation showed improvement in the lifetime of ordinary devices working in the network over the ordinary DSDV protocol. Likewise, while evaluating DSDV protocol, participating devices consume more energy as compared to our scheme, due to continued route update with neighbor devices. Conversely, in our scheme, the legitimate device updates its routing table to local and public chain information to exchange data in the network. Therefore, device participation in our scheme surpasses ordinary DSDV protocol by 11% improvement in an operational network as observed during simulation analysis. The results of both routing protocols are shown in Figure 8.
Fig. 8:
Energy consumption statistical analysis
F. Latency Results Statistical Analysis
Latency is an important aspect of wireless networks when designing protocols. We therefore considered consistency in time during the design stage of our scheme in order to exchange information effectively throughout the network. In the simulation environment, the number of devices and local chains is gradually increased to overview the duration of the exchange of messages in the network. Subsequently, malicious devices were introduced in the network with a fake authentication request in the local chain as well as in the public chain to observe the latency of legitimate device messages. Although, during the presence of malicious devices, network traffic was at its peak, the legitimate device showed consistency while exchanging data on the network. The unique pattern of communication among the legitimate devices in the proposed model played a vital role in ensuring time-consistency during the exchange of messages. The results of the proposed scheme are compared with competing schemes and are presented in Figure 9.
Fig. 9:
Latency Comparative analysis
G. Packet lost Ratio Statistical Results Analysis
Wireless communication is susceptible to various attacks and environmental factors. Therefore, packet lost ratio is given preference to define the performance reliability of any wireless network. During simulation of Hash-MAC-DSDV protocol the PLR was quantified through the following formula:
(1) |
The network traffic was increased in simulation and we quantified the ratio between packets sent and received, which showed reliable results during analysis. Moreover, the consistency of PLR was verified by targeting devices during traffic congestion in an operational network. Our results showed only 7 % PLR for the proposed model during peak traffic, verifying the significance of our scheme over the compared schemes. The statistical analysis for PLR is shown in Figure 10.
Fig. 10:
PLR Results statistical analysis
V. CONCLUSION
In this paper, we proposed Hash-MAC-DSDV, a mutual authentication scheme for CPS connected to form an IoT network. We modified the DSDV protocol to enable mutual authentication among participating devices via hop count communication. Initially, all legitimate devices registered their MAC addresses with the base stations via concerned cluster heads to form local and public chains, respectively. Upon registration, the base station applies MD5 hash algorithm to the registered MAC addresses for advertisement in the public chain, where a number of cluster heads are involved. These cluster heads advertised the base station information in the local chain and the devices update their routing table according to the advertised information. Likewise, each legitimate device uses its routing table information to send data to a destination. However, to verify the legitimacy of adjacent devices or cluster head during hop-count authentication, matching of MAC addresses is followed by each device. Our proposed scheme outperforms existing approaches in terms of attack detection rate, computation cost, communication cost, energy consumption, PLR, and latency. The unicast communication and one-way-hash authentication of our model increases its applicability in real deployments with minimal resource consumption overhead.
ACKNOWLEDGMENT
This work is partially supported by the NIH (P20GM109090), NSF (CNS-2016714), the Nebraska University Collaboration Initiative, and the Nebraska Tobacco Settlement Biomedical Research Development Funds. This research is also partially funded by the Deanship of Scientific Research at Princess Nourah Bint Abdul Rahman University through the Fast-track Research Funding Program.
Biographies
BIOGRAPHIES
Muhammad Adil received his Associate Engineer degree in Electronics form the school of Electronic associated with civil aviation Pakistan in 2010. Mr. Adil received his Bachelor of Science in Computer Science (4 years programs) and Master of Science in Computer Sciences (2 years program) with specialization in Computer Networks from Virtual University of Lahore, Pakistan in 2016 and 2019, respectively. He is currently a PhD Candidate. His research area includes routing protocols, Security, and Load Balancing in WSN, IoT, and ad hoc networks. Moreover, Mr. Adil is also interested in Dynamic Wireless Charging of Electric Vehicles connected in network topological infrastructure with Machine learning techniques. He has publications in prestigious journals such as IEEE Internet of Things, IEEE Access, IEEE Sensors, Computer Networks Elsevier, etc.
MIAN AHMAD JAN (Senior Member, IEEE) received the Ph.D. degree in computer systems from the University of Technology Sydney (UTS), Australia, in 2016. He is an Assistant Professor with Abdul Wai Khan University Mardan, Pakistan. His research articles have been published in various prestigious IEEE TRANSACTIONS and journals (Elsevier). His research interests include security and privacy in the Internet of Things and wireless sensor networks. He had been the recipient of various prestigious scholarships during his studies, notably the International Research Scholarship (IRS) from UTS, Australia, and the Commonwealth Scientific Industrial Research Organization (CSIRO) Scholarships. He was awarded the Best Researcher Award from UTS in 2014.
Spyridon Mastorakis (Member, IEEE) is an Assistant Professor in Computer Science at the University of Nebraska Omaha. He received his Ph.D. in Computer Science from the University of California, Los Angeles (UCLA) in 2019. He also received an M.S. in Computer Science from UCLA in 2017 and a 5-year diploma (equivalent to M.Eng.) in Electrical and Computer Engineering from the National Technical University of Athens (NTUA) in 2014. His research interests include network systems and protocols, Internet architectures (such as Information-Centric Networking and Named-Data Networking), edge computing, and IoT.
Houbing Song (Senior Member, IEEE) received the M.S. degree in civil engineering from the University of Texas, El Paso, TX, USA, in December 2006, and the Ph.D. degree in electrical engineering from the University of Virginia, Charlottesville, VA, USA, in August 2012. In August 2017, he joined the Department of Electrical, Computer, Software, and Systems Engineering, Embry–Riddle Aeronautical University, Daytona Beach, FL, USA, where he is currently an Assistant Professor and the Director of the Security and Optimization for Networked Globe Laboratory.His research interests include cyber–physical systems, cyber security and privacy, Internet of Things, edge computing, AI/machine learning, big data analytics, unmanned aircraft systems, connected vehicle, smart and connected health, and wireless communications and networking.
MUHAMMAD MOHSIN JADOON received his B.S. and M.S. degrees in Electronic engineering from COMSATS University Islamabad, and International Islamic University Islamabad (IIUI),Pakistan, in 2007 and 2011, respectively. Dr. M Mohsin Jadoon did PhD in Split degree programs i.e. course work from IIUI and research from Queen Merry University (QMU) London, UK in 2018. Currently, he is post-doctorate research fellow at Department of Radiology and Imaging processing, Yale university, New Haven, CT, USA. He is also Lecturer with the Electrical Engineering Department, International Islamic University Islamabad. His research interests include Signal & Processing, Sensors and biomedical Imaging.
Safia Abbas works as associate professor with the Department of Computer Science, Faculty of Computer and Information Sciences, Princess Nourah-bintAbdulrahman University, KSA, during 2019–2021, and University of Ain Shams, Cairo, Egypt during 2016–2018. During 2006–2011, she received the Ph.D. from the Graduate School of Science and Technology, Niigata University, Japan. A strong theme of her work is in the swarm optimizers, and security in cloud, Medical Diagnosis using machine learning and Data mining.
Ahmed Farouk (Member, IEEE) is currently assistant professor, before that he was a Postdoctoral Research Fellow at Wilfrid Laurier University and Ryerson University, Canada. He received his M.Sc. and Ph.D. degrees from Mansoura University, Egypt. He is one of the Top 20 technical co-founders of the Quantum Machine Learning Program by Creative Destruction Lab at the University of Toronto. Furthermore, he is selected as Top 25 of Innovate TO 150 Canada to showcase the best of Toronto’s next generation of change-makers, innovators, and entrepreneurs. He is exceptionally well known for his seminal contributions to theories of Quantum Information, Communication, and Cryptography.
Contributor Information
Muhammad Adil, Department of Computer Science, Virtual University of Pakistan, 54–Lawrence Road, Lahore 54000, Pakistan.
Mian Ahmad Jan, Department of Computer Science, Abdul Wali Khan University Mardan, Pakistan..
Spyridon Mastorakis, Computer Science Department, University of Nebraska at Omaha, Omaha, USA..
Houbing Song, Department of Electrical Engineering and Computer Science, Embry-Riddle Aeronautical University, USA..
Muhammad Mohsin Jadoon, Department of Radiology and imaging, Yale University, New Haven, CT, USA and Department of Electrical Engineering, International Islamic University Islamabad.
Safia Abbas, Computer Science Department, Princess Nourah Bint Abdul rahman University, KSA..
Ahmed Farouk, Computer Science and Physics Department, Wilfrid Laurier University..
REFERENCES
- [1].Ding Wenxiu, Jing Xuyang, Yan Zheng, and Laurence T Yang. A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion. Information Fusion, 51:129–144, 2019. [Google Scholar]
- [2].Jiang Qi, Qian Yuanyuan, Ma Jianfeng, Ma Xindi, Cheng Qingfeng, and Wei Fushan. User centric three-factor authentication protocol for cloud-assisted wearable devices. International Journal of Communication Systems, 32(6):e3900, 2019. [Google Scholar]
- [3].Wang Quan, Lin Deyu, Yang Pengfei, and Zhang Zhiqiang. An energy-efficient compressive sensing-based clustering routing protocol for wsns. IEEE Sensors Journal, 19(10):3950–3960, 2019. [Google Scholar]
- [4].Gubbi Jayavardhana, Buyya Rajkumar, Marusic Slaven, and Palaniswami Marimuthu. Internet of things (iot): A vision, architectural elements, and future directions. Future generation computer systems, 29(7):1645–1660, 2013. [Google Scholar]
- [5].Khan Minhaj Ahmad and Salah Khaled. Iot security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82:395–411, 2018. [Google Scholar]
- [6].al Mahmod Md Jubayer and Guin Ujjwal. A robust, low-cost and secure authentication scheme for iot applications. Cryptography, 4(1):8, 2020. [Google Scholar]
- [7].Ferrag Mohamed Amine, Maglaras Leandros, and Ahmim Ahmed. Privacy-preserving schemes for ad hoc social networks: A survey. IEEE Communications Surveys & Tutorials, 19(4):3015–3045, 2017. [Google Scholar]
- [8].Huang Junqin, Kong Linghe, Chen Guihai, Wu Min-You, Liu Xue, and Zeng Peng. Towards secure industrial iot: Blockchain system with credit-based consensus mechanism. IEEE Transactions on Industrial Informatics, 15(6):3680–3689, 2019. [Google Scholar]
- [9].Biswas Sujit, Sharif Kashif, Li Fan, Nour Boubakr, and Wang Yu. A scalable blockchain framework for secure transactions in iot. IEEE Internet of Things Journal, 6(3):4650–4659, 2018. [Google Scholar]
- [10].Wu Fan, Li Xiong, Sangaiah Arun Kumar, Xu Lili, Kumari Saru, Wu Liuxi, and Shen Jian. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82:727–737, 2018. [Google Scholar]
- [11].Hammi Mohamed Tahar Badis, Bellot Patrick, and Serhrouchni Ahmed. Bubbles of trust: A decentralized blockchain-based authentication system for iot. Computers & Security, 78:126–142, 2018. [Google Scholar]
- [12].A Yu Jia-Jia Ji, Wang Yuan, Sun Hong-Bing, et al. Wireless monitoring system for corrosion degree of reinforcement in concrete. Journal of Nanoelectronics and Optoelectronics, 14(6):887–893, 2019. [Google Scholar]
- [13].Adil Muhammad, Almaiah Mohammed Amin, Alsayed Alhuseen Omar, and Almomani Omar. An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors, 20(8):2311, 2020. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [14].Khalid Umair, Asim Muhammad, Baker Thar, Hung Patrick CK, Tariq Muhammad Adnan, and Rafferty Laura. A decentralized lightweight blockchain-based authentication mechanism for iot systems. Cluster Computing, pages 1–21, 2020. [Google Scholar]
- [15].Tonyali Samet, Akkaya Kemal, Saputro Nico, Uluagac A Selcuk, and Nojoumian Mehrdad. Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems. Future Generation Computer Systems, 78:547–557, 2018. [Google Scholar]
- [16].Aloqaily Moayad, Al Ridhawi Ismaeel, Salameh Haythem Bany, and Jararweh Yaser. Data and service management in densely crowded environments: Challenges, opportunities, and recent developments. IEEE Communications Magazine, 57(4):81–87, 2019. [Google Scholar]
- [17].Baker Thar, Asim Muhammad, MacDermott Aine, Iqbal Farkhund,´ Kamoun Faouzi, Shah Babar, Alfandi Omar, and Hammoudeh Mohammad. A secure fog-based platform for scada-based iot critical infrastructure. Software: Practice and Experience, 50(5):503–518, 2020. [Google Scholar]
- [18].Rathee Geetanjali, Sharma Ashutosh, Iqbal Razi, Aloqaily Moayad, Jaglan Naveen, and Kumar Rajiv. A blockchain framework for securing connected and autonomous vehicles. Sensors, 19(14):3165, 2019. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [19].Tariq Noshina, Asim Muhammad, Al-Obeidat Feras, Zubair Farooqi Muhammad, Baker Thar, Hammoudeh Mohammad, and Ghafir Ibrahim. The security of big data in fog-enabled iot applications including blockchain: a survey. Sensors, 19(8):1788, 2019. [DOI] [PMC free article] [PubMed] [Google Scholar]
- [20].Gope Prosanta and Sikdar Biplab. Lightweight and privacy-preserving two-factor authentication scheme for iot devices. IEEE Internet of Things Journal, 6(1):580–589, 2018. [Google Scholar]
- [21].Feng Wei, Qin Yu, Zhao Shijun, and Feng Dengguo. Aaot: Lightweight attestation and authentication of low-resource things in iot and cps. Computer Networks, 134:167–182, 2018. [Google Scholar]
- [22].Li Lun, Liu Jiqiang, Cheng Lichen, Qiu Shuo, Wang Wei, Zhang Xiangliang, and Zhang Zonghua. Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Transactions on Intelligent Transportation Systems, 19(7):2204–2220, 2018. [Google Scholar]
- [23].Cui Zhihua, Xue Fei, Cai Xingjuan, Cao Yang, Wang Gai-ge, and Chen Jinjun. Detection of malicious code variants based on deep learning. IEEE Transactions on Industrial Informatics, 14(7):3187–3196, 2018. [Google Scholar]
- [24].Aitzhan Nurzhan Zhumabekuly and Svetinovic Davor. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Transactions on Dependable and Secure Computing, 15(5):840–852, 2016. [Google Scholar]
- [25].Salman Tara, Zolanvari Maede, Erbad Aiman, Jain Raj, and Samaka Mohammed. Security services using blockchains: A state of the art survey. IEEE Communications Surveys & Tutorials, 21(1):858–880, 2018. [Google Scholar]
- [26].Cai Xingjuan, Zhang Jiangjiang, Liang Hao, Wang Lei, and Wu Qidi. An ensemble bat algorithm for large-scale optimization. International Journal of Machine Learning and Cybernetics, 10(11):3099–3113, 2019. [Google Scholar]
- [27].Pan Jianli, Wang Jianyu, Hester Austin, Alqerm Ismail, Liu Yuanni, and Zhao Ying. Edgechain: An edge-iot framework and prototype based on blockchain and smart contracts. IEEE Internet of Things Journal, 6(3):4719–4732, 2018. [Google Scholar]
- [28].Bao Zijian, Shi Wenbo, He Debiao, and Raymond Chood Kim-Kwang. Iotchain: A three-tier blockchain-based iot security architecture. arXiv preprint arXiv:1806.02008, 2018. [Google Scholar]
- [29].Won Jongho, Seo Seung-Hyun, and Bertino Elisa. Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access, 5:3721–3749, 2017. [Google Scholar]