LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)

Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2021-09, Vol.108, p.102351, Article 102351
Hauptverfasser: Shah, Syed W., Syed, Naeem F., Shaghaghi, Arash, Anwar, Adnan, Baig, Zubair, Doss, Robin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 102351
container_title Computers & security
container_volume 108
creator Shah, Syed W.
Syed, Naeem F.
Shaghaghi, Arash
Anwar, Adnan
Baig, Zubair
Doss, Robin
description Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication.
doi_str_mv 10.1016/j.cose.2021.102351
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2561518632</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404821001759</els_id><sourcerecordid>2561518632</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</originalsourceid><addsrcrecordid>eNp9kD1PwzAQhi0EEqXwB5gsscCQ4o_YSRFLlPIlRWIpSxfjOhfqCGKwnSL-PYnCzHJ3unvfO_tB6JySBSVUXrcL4wIsGGF0aDAu6AGa0TxjiWQkP0SzQZQlKUnzY3QSQksIzWSez9BrVa6KG1zZt138hjHi0nXRdr3rA17B3hpIokumChd93MEwNjpa1-HGeazxBrzDa9-HiAtvdjaCib0HfLlZF1en6KjR7wHO_vIcvdzfrcvHpHp-eCqLKjGc5TGRW2hYajLBBU8Fr3ktckgJN4zRertMRdYQySlrNJV1arTUROiGEqJNClov-RxdTHs_vfvqIUTVut53w0nFhKSC5pKzQcUmlfEuBA-N-vT2Q_sfRYkaSapWjSTVSFJNJAfT7WSC4f17C14FY6EzUFs_fFXVzv5n_wXVensm</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2561518632</pqid></control><display><type>article</type><title>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Shah, Syed W. ; Syed, Naeem F. ; Shaghaghi, Arash ; Anwar, Adnan ; Baig, Zubair ; Doss, Robin</creator><creatorcontrib>Shah, Syed W. ; Syed, Naeem F. ; Shaghaghi, Arash ; Anwar, Adnan ; Baig, Zubair ; Doss, Robin</creatorcontrib><description>Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2021.102351</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Authentication ; Communication ; Continuous authentication ; Cybersecurity ; Device-to-Device communication ; Internet of Things ; Internet of things (IoT) ; Lightweight ; Mathematical analysis ; Mathematical functions ; Resource constrained devices ; Vectors (mathematics) ; Zero trust architecture (ZTA)</subject><ispartof>Computers &amp; security, 2021-09, Vol.108, p.102351, Article 102351</ispartof><rights>2021 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Sep 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</citedby><cites>FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404821001759$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids></links><search><creatorcontrib>Shah, Syed W.</creatorcontrib><creatorcontrib>Syed, Naeem F.</creatorcontrib><creatorcontrib>Shaghaghi, Arash</creatorcontrib><creatorcontrib>Anwar, Adnan</creatorcontrib><creatorcontrib>Baig, Zubair</creatorcontrib><creatorcontrib>Doss, Robin</creatorcontrib><title>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</title><title>Computers &amp; security</title><description>Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication.</description><subject>Authentication</subject><subject>Communication</subject><subject>Continuous authentication</subject><subject>Cybersecurity</subject><subject>Device-to-Device communication</subject><subject>Internet of Things</subject><subject>Internet of things (IoT)</subject><subject>Lightweight</subject><subject>Mathematical analysis</subject><subject>Mathematical functions</subject><subject>Resource constrained devices</subject><subject>Vectors (mathematics)</subject><subject>Zero trust architecture (ZTA)</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kD1PwzAQhi0EEqXwB5gsscCQ4o_YSRFLlPIlRWIpSxfjOhfqCGKwnSL-PYnCzHJ3unvfO_tB6JySBSVUXrcL4wIsGGF0aDAu6AGa0TxjiWQkP0SzQZQlKUnzY3QSQksIzWSez9BrVa6KG1zZt138hjHi0nXRdr3rA17B3hpIokumChd93MEwNjpa1-HGeazxBrzDa9-HiAtvdjaCib0HfLlZF1en6KjR7wHO_vIcvdzfrcvHpHp-eCqLKjGc5TGRW2hYajLBBU8Fr3ktckgJN4zRertMRdYQySlrNJV1arTUROiGEqJNClov-RxdTHs_vfvqIUTVut53w0nFhKSC5pKzQcUmlfEuBA-N-vT2Q_sfRYkaSapWjSTVSFJNJAfT7WSC4f17C14FY6EzUFs_fFXVzv5n_wXVensm</recordid><startdate>202109</startdate><enddate>202109</enddate><creator>Shah, Syed W.</creator><creator>Syed, Naeem F.</creator><creator>Shaghaghi, Arash</creator><creator>Anwar, Adnan</creator><creator>Baig, Zubair</creator><creator>Doss, Robin</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202109</creationdate><title>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</title><author>Shah, Syed W. ; Syed, Naeem F. ; Shaghaghi, Arash ; Anwar, Adnan ; Baig, Zubair ; Doss, Robin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Authentication</topic><topic>Communication</topic><topic>Continuous authentication</topic><topic>Cybersecurity</topic><topic>Device-to-Device communication</topic><topic>Internet of Things</topic><topic>Internet of things (IoT)</topic><topic>Lightweight</topic><topic>Mathematical analysis</topic><topic>Mathematical functions</topic><topic>Resource constrained devices</topic><topic>Vectors (mathematics)</topic><topic>Zero trust architecture (ZTA)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shah, Syed W.</creatorcontrib><creatorcontrib>Syed, Naeem F.</creatorcontrib><creatorcontrib>Shaghaghi, Arash</creatorcontrib><creatorcontrib>Anwar, Adnan</creatorcontrib><creatorcontrib>Baig, Zubair</creatorcontrib><creatorcontrib>Doss, Robin</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shah, Syed W.</au><au>Syed, Naeem F.</au><au>Shaghaghi, Arash</au><au>Anwar, Adnan</au><au>Baig, Zubair</au><au>Doss, Robin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</atitle><jtitle>Computers &amp; security</jtitle><date>2021-09</date><risdate>2021</risdate><volume>108</volume><spage>102351</spage><pages>102351-</pages><artnum>102351</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2021.102351</doi></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2021-09, Vol.108, p.102351, Article 102351
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_2561518632
source Elsevier ScienceDirect Journals Complete
subjects Authentication
Communication
Continuous authentication
Cybersecurity
Device-to-Device communication
Internet of Things
Internet of things (IoT)
Lightweight
Mathematical analysis
Mathematical functions
Resource constrained devices
Vectors (mathematics)
Zero trust architecture (ZTA)
title LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T20%3A25%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=LCDA:%20Lightweight%20Continuous%20Device-to-Device%20Authentication%20for%20a%20Zero%20Trust%20Architecture%20(ZTA)&rft.jtitle=Computers%20&%20security&rft.au=Shah,%20Syed%20W.&rft.date=2021-09&rft.volume=108&rft.spage=102351&rft.pages=102351-&rft.artnum=102351&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2021.102351&rft_dat=%3Cproquest_cross%3E2561518632%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2561518632&rft_id=info:pmid/&rft_els_id=S0167404821001759&rfr_iscdi=true