Composable-secure authentication protocol for mobile sensors roaming in the Internet of Things

LiangMin Wang,ShunRong Jiang,YuanBo Guo
DOI: https://doi.org/10.1360/112011-1081
2012-01-01
Abstract:Internet of Things is composed by sensor subnets and transmission backbone network. Because of the limited capacity of nodes in sensor subnets, the mobile sensor nodes often move from one cluster to another so that they can access and obtain cross-region information. The backbone transmission network depends on the existing Internet infrastructure and provides powerful services. In this case, the roaming of mobile nodes brings about some new security problems. On one hand, we should ensure that the mobile node joins the new foreign cluster efficiently and securely during roaming, which looks like roaming demand in MANET. However it should be much more light weight because sensor nodes’ resource is extremely limited. On the other hand, the security of mobile nodes is light weight which is different from that of backbone networks. The security level of backbone network should not be reduced by a mobile node roaming and joining a new cluster. So the authentication protocol should be composable security, when the light weight secure protocol connects with traditional backbone network protocol. In this paper, we focus on the sensor nodes roaming problem based on the Internet of Things, and propose a new random roaming authentication protocol (RMRAP). Our RMRAP takes into account both the security and feasibility of practical application. The protocol achieves the light weight authentication and protects the privacy of the mobile node while roaming among the clusters and generates forward security session key. We also test the composable security at cluster head which connects the backbone network and the sensor subnet serving as a gateway. We also analyze the performance of RMRAP protocol in both the theoretical analysis and experiment simulations, and compare it with some related work. The comparison shows that our RMRAP has some advantages of compose security, computation and communication overheads over these related protocols.
What problem does this paper attempt to address?