FLAT: Federated Lightweight Authentication of Things
Abstract
The authentication of devices is one of the current challenges in IoT. In this sense, it is essential the development of an authentication model for IoT, especially considering the computational and storage restrictions of devices and their potential mobility between different domains. FLAT is a federated authentication protocol for IoT that aims to be a solution to this problem, associating symmetric cryptosystems in the Client side and implicit certificates. The results show that FLAT can reduce the data exchange overhead in around 31% when compared to the Baseline solution. FLAT’s Client is also more efficient than the Baseline solution in terms of data transmitted and computation time, showing it can be an alternative to authentication in restricted devices.
References
Atzori, L., Iera, A., and Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15):2787 – 2805.
Birrell, E. and Schneider, F. B. (2013). Federated Identity Management Systems: A Privacy-based Characterization. IEEE Security & Privacy, 11(5):36–48.
Brown, D. R., Gallant, R., and Vanstone, S. A. (2001). Provably Secure Implicit Certificate Schemes. In FC’01. Springer.
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., and Ferrari, G. (2015). IoT-OAS: An OAuth-based Authorization Service Architecture for Secure Services in IoT Scenarios. IEEE Sensors Journal, 15(2):1224–1234.
Domenech, M. C., Boukerche, A., and Wangham, M. S. (2016). An Authentication and Authorization Infrastructure for the Web of Things. In Q2SWinet. ACM.
Hong, J., Levy, A., and Levis, P. (2016). Demo: Building Comprehensible Access Control for the Internet of Things Using Beetle. In MobiSys’16. ACM.
Hummen, R., Ziegeldorf, J. H., Shafagh, H., Raza, S., and Wehrle, K. (2013). Towards Viable Certificate-based Authentication for the Internet of Things. In Hot Topics on Wireless Network Security and Privacy, pages 37–42. ACM.
Maler, E. and Reed, D. (2008). The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security & Privacy, 6(2).
Shim, S. S., Bhalla, G., and Pendyala, V. (2005). Federated Identity Management. IEEE Computer, 38(12):120–122.
Silva, C. E. and Silva, G. C. (2017). Uma Proposta de Arquitetura para Autorização Federada com Internet das Coisas. In SBSeg’17. SBC.
Suh, G. E. and Devadas, S. (2007). Physical Unclonable Functions for Device Authentication and Secret Key Generation. In 44th DAC. ACM.
Windley, P. J. (2005). Digital Identity: Unmasking Identity Management Architecture (IMA). O’Reilly Media, Inc.
Witkovski, A., Santin, A., Abreu, V., and Marynowski, J. (2015). An IdM and Key-based Authentication Method for Providing Single Sign-On in IoT. In GLOBECOM. IEEE.
