A Lightweight Authentication Method in Perception Layer of IoT Through Digital Watermarking
Neeraj Kumar1, Deepak Singh Tomar2
1Neeraj Kumar, Computer Science and Engineering Department, Assistant Professor, Shri Ramswaroop Memorial University Lucknow, India.
2Dr. Deepak Singh Tomar, Computer Science and Engineering Department, Associate Professor, Maulana Azad National Institute of Technology, Bhopal, India.
Manuscript received on 6 August 2019. | Revised Manuscript received on 12 August 2019. | Manuscript published on 30 September 2019. | PP: 2937-2942 | Volume-8 Issue-3 September 2019 | Retrieval Number: C4793098319/2019©BEIESP | DOI: 10.35940/ijrte.C4793.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Introduction of IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained till date. IoT systems collect the voluminous amount of data in real time from hospitals, battlefield and daily living environment which is related to privacy and security of people. So, securing collected sensitive data is one of the major challenges in the development of IoT systems. Authenticating the source of collected data is utmost important because the adversary may act as a source which may lead to a breach in security and privacy of people using the IoT network. IoT devices are resource scarce so lightweight methods for network security and privacy need to develop to achieve future development goals. In this paper, a novel lightweight node to node authentication scheme based on watermark is proposed to solve the contradiction between the security and restricted resources of perception layer. To improve the security, Proposed scheme usage node identity and the number of neighbours as input to generate the watermark and use the watermark to calculate the embedding positions which makes node authentication based on temporal dynamics of sensing network. The generated watermark is embedded in fixed size message digest generated using the variable message as input into a low-cost one-way hashing algorithm LOCHA. The embedded bits of watermark extracted at the receiving node and matched to check the authenticity of the sender node. The security analysis and simulations of the proposed scheme show that it can be a good candidate to ensure the authentication of the resource constraint devices which are integral part of Internet of Things at low cost.
Index Terms: Authentication., IoT(Internet of Things), LOCHA, Watermark,
Scope of the Article: Authentication, Authorization, Accounting