from Part III - Secret Key Generation and Authentication
Published online by Cambridge University Press: 28 June 2017
Authentication of messages in an Internet of Things (IoT) is a key security feature that may involve heavy signaling and protocol procedures, not suitable for small devices with very limited computational capabilities and energy availability. In this chapter we address the problem of message authentication in an IoT context, by using physical-layer approaches. We propose a solution based on the use of trusted anchor nodes that estimate the channel from the transmitting node and report them to a concentrator node, which takes a decision on the message authenticity. Assuming that the anchor nodes have a limited energy availability, we analyze the lifespan of the authenticating network and propose both centralized and distributed approaches to determine which anchor nodes report the information to the concentrator. The authenticating network overhead is also discussed and a tradeoff between energy efficiency and signaling traffic is found.
IoT Authentication Overview
In the near future it is expected that many devices in common use will be connected to the Internet, thus enabling enhanced features and applications, from flexible home automation to customization of body area networks. Huge security challenges must be faced in this new scenario.We will focus on the authentication problem, i.e., the problem of determining whether a message has been truly transmitted by a specific device. In other words, we want to make sure that no malicious node is transmitting messages in place of a legitimate node.
In an IoT scenario the dramatically large number of nodes calls for simple authentication techniques. As will be discussed in more detail in Section 14.2, the most popular IoT standards address the problem of authentication only with approaches based on cryptography that require complex processing procedures and the exchange (and refresh) of keys among the devices. An open-minded approach, trying to include new techniques, e.g., at the physical layer, could contribute strongly to the solution of the problem.
Therefore, here we investigate solutions that exploit the features of wireless transmissions and can integrate well other authentication procedures implemented in the higher layers.
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.