LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavio...
Gespeichert in:
Veröffentlicht in: | Computers & security 2021-09, Vol.108, p.102351, Article 102351 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 102351 |
container_title | Computers & security |
container_volume | 108 |
creator | Shah, Syed W. Syed, Naeem F. Shaghaghi, Arash Anwar, Adnan Baig, Zubair Doss, Robin |
description | Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication. |
doi_str_mv | 10.1016/j.cose.2021.102351 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2561518632</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404821001759</els_id><sourcerecordid>2561518632</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</originalsourceid><addsrcrecordid>eNp9kD1PwzAQhi0EEqXwB5gsscCQ4o_YSRFLlPIlRWIpSxfjOhfqCGKwnSL-PYnCzHJ3unvfO_tB6JySBSVUXrcL4wIsGGF0aDAu6AGa0TxjiWQkP0SzQZQlKUnzY3QSQksIzWSez9BrVa6KG1zZt138hjHi0nXRdr3rA17B3hpIokumChd93MEwNjpa1-HGeazxBrzDa9-HiAtvdjaCib0HfLlZF1en6KjR7wHO_vIcvdzfrcvHpHp-eCqLKjGc5TGRW2hYajLBBU8Fr3ktckgJN4zRertMRdYQySlrNJV1arTUROiGEqJNClov-RxdTHs_vfvqIUTVut53w0nFhKSC5pKzQcUmlfEuBA-N-vT2Q_sfRYkaSapWjSTVSFJNJAfT7WSC4f17C14FY6EzUFs_fFXVzv5n_wXVensm</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2561518632</pqid></control><display><type>article</type><title>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Shah, Syed W. ; Syed, Naeem F. ; Shaghaghi, Arash ; Anwar, Adnan ; Baig, Zubair ; Doss, Robin</creator><creatorcontrib>Shah, Syed W. ; Syed, Naeem F. ; Shaghaghi, Arash ; Anwar, Adnan ; Baig, Zubair ; Doss, Robin</creatorcontrib><description>Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2021.102351</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Authentication ; Communication ; Continuous authentication ; Cybersecurity ; Device-to-Device communication ; Internet of Things ; Internet of things (IoT) ; Lightweight ; Mathematical analysis ; Mathematical functions ; Resource constrained devices ; Vectors (mathematics) ; Zero trust architecture (ZTA)</subject><ispartof>Computers & security, 2021-09, Vol.108, p.102351, Article 102351</ispartof><rights>2021 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Sep 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</citedby><cites>FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167404821001759$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65534</link.rule.ids></links><search><creatorcontrib>Shah, Syed W.</creatorcontrib><creatorcontrib>Syed, Naeem F.</creatorcontrib><creatorcontrib>Shaghaghi, Arash</creatorcontrib><creatorcontrib>Anwar, Adnan</creatorcontrib><creatorcontrib>Baig, Zubair</creatorcontrib><creatorcontrib>Doss, Robin</creatorcontrib><title>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</title><title>Computers & security</title><description>Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication.</description><subject>Authentication</subject><subject>Communication</subject><subject>Continuous authentication</subject><subject>Cybersecurity</subject><subject>Device-to-Device communication</subject><subject>Internet of Things</subject><subject>Internet of things (IoT)</subject><subject>Lightweight</subject><subject>Mathematical analysis</subject><subject>Mathematical functions</subject><subject>Resource constrained devices</subject><subject>Vectors (mathematics)</subject><subject>Zero trust architecture (ZTA)</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kD1PwzAQhi0EEqXwB5gsscCQ4o_YSRFLlPIlRWIpSxfjOhfqCGKwnSL-PYnCzHJ3unvfO_tB6JySBSVUXrcL4wIsGGF0aDAu6AGa0TxjiWQkP0SzQZQlKUnzY3QSQksIzWSez9BrVa6KG1zZt138hjHi0nXRdr3rA17B3hpIokumChd93MEwNjpa1-HGeazxBrzDa9-HiAtvdjaCib0HfLlZF1en6KjR7wHO_vIcvdzfrcvHpHp-eCqLKjGc5TGRW2hYajLBBU8Fr3ktckgJN4zRertMRdYQySlrNJV1arTUROiGEqJNClov-RxdTHs_vfvqIUTVut53w0nFhKSC5pKzQcUmlfEuBA-N-vT2Q_sfRYkaSapWjSTVSFJNJAfT7WSC4f17C14FY6EzUFs_fFXVzv5n_wXVensm</recordid><startdate>202109</startdate><enddate>202109</enddate><creator>Shah, Syed W.</creator><creator>Syed, Naeem F.</creator><creator>Shaghaghi, Arash</creator><creator>Anwar, Adnan</creator><creator>Baig, Zubair</creator><creator>Doss, Robin</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>202109</creationdate><title>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</title><author>Shah, Syed W. ; Syed, Naeem F. ; Shaghaghi, Arash ; Anwar, Adnan ; Baig, Zubair ; Doss, Robin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-6bef24c75353453d3d58e403c221db9457f06312fa16d4ca6a05af100ac4eaa93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Authentication</topic><topic>Communication</topic><topic>Continuous authentication</topic><topic>Cybersecurity</topic><topic>Device-to-Device communication</topic><topic>Internet of Things</topic><topic>Internet of things (IoT)</topic><topic>Lightweight</topic><topic>Mathematical analysis</topic><topic>Mathematical functions</topic><topic>Resource constrained devices</topic><topic>Vectors (mathematics)</topic><topic>Zero trust architecture (ZTA)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shah, Syed W.</creatorcontrib><creatorcontrib>Syed, Naeem F.</creatorcontrib><creatorcontrib>Shaghaghi, Arash</creatorcontrib><creatorcontrib>Anwar, Adnan</creatorcontrib><creatorcontrib>Baig, Zubair</creatorcontrib><creatorcontrib>Doss, Robin</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shah, Syed W.</au><au>Syed, Naeem F.</au><au>Shaghaghi, Arash</au><au>Anwar, Adnan</au><au>Baig, Zubair</au><au>Doss, Robin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)</atitle><jtitle>Computers & security</jtitle><date>2021-09</date><risdate>2021</risdate><volume>108</volume><spage>102351</spage><pages>102351-</pages><artnum>102351</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to continuously authenticate Internet of Things (IoT) devices. Challenges are exacerbated with the increased adoption of device-to-device (d2d) communication in critical infrastructures. Existing d2d authentication protocols proposed in the literature are either prone to subversion or are computationally infeasible to be deployed on constrained IoT devices. In view of these challenges, we propose a novel, Lightweight Continuous Device-to-Device Authentication (LCDA) protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing session keys for continuous device authentication. Our extensive informal and formal analysis confirms the efficacy of the proposed LCDA protocol in terms of its resilience to known attack vectors, thereby demonstrating its strong potential for deployment in critical and resource-constrained scenarios for secure d2d communication.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2021.102351</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2021-09, Vol.108, p.102351, Article 102351 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_journals_2561518632 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Authentication Communication Continuous authentication Cybersecurity Device-to-Device communication Internet of Things Internet of things (IoT) Lightweight Mathematical analysis Mathematical functions Resource constrained devices Vectors (mathematics) Zero trust architecture (ZTA) |
title | LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T20%3A25%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=LCDA:%20Lightweight%20Continuous%20Device-to-Device%20Authentication%20for%20a%20Zero%20Trust%20Architecture%20(ZTA)&rft.jtitle=Computers%20&%20security&rft.au=Shah,%20Syed%20W.&rft.date=2021-09&rft.volume=108&rft.spage=102351&rft.pages=102351-&rft.artnum=102351&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2021.102351&rft_dat=%3Cproquest_cross%3E2561518632%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2561518632&rft_id=info:pmid/&rft_els_id=S0167404821001759&rfr_iscdi=true |