Event Details

Secure Mutual Authentication framework and Automated Access Control for IoT Smart Home.

Presenter: Mohammed Alshahrani
Supervisor:

Date: Fri, August 17, 2018
Time: 11:30:00 - 13:30:00
Place: EOW 430

ABSTRACT

Abstract

Internet of Things (IoT) platforms face a huge challenge in deploying robust authentication mechanisms because edge devices and resource-constrained devices may not have enough computing power and storage capability to deploy and run the existing mechanisms, which generally involve complex computations. Although cloud computing platforms have powerful resources to do these tasks, they are frequently too far away to process the data and respond at the right time. Moreover, transporting sensitive data through the Internet might come across the issue of handling multiple countries' regulations. Therefore, fog computing technology, which is emerging as an extension of cloud computing, can play a key role in solving these issues. It is believed that fog computing will optimise and improve the security of the IoT system. In this seminar, I will present a secure lightweight and key exchange protocol for an IoT smart home environment with mutual authentication that is based on dynamic identity and temporary keys. Nodes can anonymously authenticate and establish a session with the controller node using dynamic identities and symmetric keys in an unlinkable manner. Moreover, the enforcement of security policy between nodes is ensured by setting up a virtual domain segregation and restricting the nodes’ capabilities to send and receive instructions and commands to or from other nodes. Cumulative chained-hash is introduced to ensure the identity of the sender (through a challenge-response) and guarantee the freshness of a protocol execution instance. In addition, the fog computing concept is capitalized on to improve identity assurance. The proposed framework provides a powerful tool that will make the IoT infrastructures secure by ensuring that the identities of IoT devices are always authentic and the IoT nodes always act within their normal area of operation.