Research Article
BibTex RIS Cite
Year 2022, Volume: 8 Issue: 4, 677 - 694, 15.12.2022
https://doi.org/10.28979/jarnas.1034534

Abstract

References

  • Aydin, Y., Kurt, G. K., Ozdemir, E., & Yanikomeroglu, H. (2020). A flexible and lightweight group Authentication Scheme. IEEE Internet of Things Journal, 7(10), 10277-10287. DOI: https://www.doi.org/10.1109/jiot.2020.3004300
  • Apache JMeter. Retrieved June 6, 2020, from http://jmeter.apache.org
  • Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based Access Authentication for MTC in LTE Networks. Security and Communication Networks, 8(17), 3282-3299. DOI: https://www.doi.org/10.1002/sec.1252
  • Chen, Y., Wang, J., Chi, K., & Tseng, C. (2010). Group-based Authentication and Key Agreement. Wireless Personal Communications, 62(4), 965-979. DOI: https://www.doi.org/10.1007/s11277-010-0104-7
  • Define IOT. (2015, May 25). Retrieved October 22, 2019, from https://iot.ieee.org/definition.html
  • Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A Networks. Security and Communication Networks. DOI: https://www.doi.org/10.1002/sec.1455
  • Gartner says 5.8 billion enterprise and automotive IoT endpoints will be in use in 2020. (2019, August 29). Retrieved February 12, 2020, from https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io
  • Gartner says worldwide IoT security spending will reach $1.5 billion in 2018. (2018, March 21). Retrieved May 07, 2019, from https://www.gartner.com/en/newsroom/press-releases/2018-03-21-gartner-says-worldwide-iot-security-spending-will-reach-1-point-5-billion-in-2018
  • IoT Analytics, State of the IoT 2018: Number of IoT devices now at 7B – market accelerating. (2018, August 08). Retrieved March 19, 2020, from https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b
  • IoT Analytics, State of the IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally. (2022, May 18). Retrieved June 22, 2022, from https://iot-analytics.com/number-connected-iot-devices
  • IoT OCEAN. (2017, July 9). Retrieved from http://developers.iotocean.org/archives/module/mobius
  • Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group Authentication and Key Agreement Protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601. DOI: https://www.doi.org/10.1155/2013/304601
  • RFC7519. (2015, May). Retrieved April 21, 2020, from https://datatracker.ietf.org/doc/html/rfc7519
  • KETI. (1991, August). Retrieved from https://www.keti.re.kr
  • Kim, J., Choi, S., Yun, J., & Lee, J. (2016). Towards the onem2M standards for building IoT ecosystem: Analysis, implementation, and lessons. Peer-to-Peer Networking and Applications, 11(1), 139-151. DOI: https://www.doi.org/10.1007/s12083-016-0505-9
  • Lai, C., Li, H., Li, X., & Cao, J. (2013). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414-431. DOI: https://www.doi.org/10.1002/ett.2635
  • Lai, C., Li, H., Lu, R., & Shen, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE Networks. Computer Networks, 57(17), 3492-3510. DOI: https://www.doi.org/10.1016/j.comnet.2013.08.003
  • Lai, C., Lu, R., Zheng, D., Li, H., & (Sherman) Shen, X. (2016). GLARM: Group-based Lightweight Authentication Scheme for resource-constrained machine-to-machine communications. Computer Networks, 99, 66-81. DOI: https://www.doi.org/10.1016/j.comnet.2016.02.007
  • Li, J., Wen, M., & Zhang, T. (2016). Group-based Authentication and key agreement with Dynamic Policy Updating for MTC in LTE-A Networks2. IEEE Internet of Things Journal, 3(3), 408-417. DOI: https://www.doi.org/10.1109/jiot.2015.2495321
  • Modiri, M. M., Mohajeri, J., & Salmasizadeh, M. (2018). GSL-AKA: Group-based Secure Lightweight Authentication and key agreement protocol for M2M communication. 2018 9th International Symposium on Telecommunications (IST). DOI: https://www.doi.org/10.1109/istel.2018.8661145
  • MongoDB: The Application Data Platform. (2007). Retrieved May 04, 2020, from http://www.mongodb.com
  • nCube-Lavender. (2018, May 30). Retrieved from http://developers.iotocean.org/archives/module/ncube-lavender
  • nCube-Rosemary. (2018, May 31). Retrieved from http://developers.iotocean.org/archives/module/ncube-rosemary
  • nCube-Thyme Nodejs. (2018, July 2). Retrieved from http://developers.iotocean.org/archives/module/ncube-thyme-nodejs
  • OneM2M, the global community that develops standards for IoT. (2012). Retrieved from http://www.onem2m.org
  • Parne, B. L., Gupta, S., & Chaudhari, N. S. (2018). SEGB: Security Enhanced Group-based AKA protocol for M2M Communication in an IoT enabled LTE/LTE-A Network. IEEE Access, 6, 3668-3684. DOI: https://www.doi.org/10.1109/access.2017.2788919
  • Padmashree, M. G., Mallikarjun, Arunalatha, J. S., & Venugopal, K. R. (2022). GKEAE: Group Key Exchange and authentication with ECC in internet of things. Intelligent Systems, 1-10. DOI: https://www.doi.org/10.1007/978-981-19-0901-6_1
  • Passport.js. Retrieved February 13, 2020, from http://www.passportjs.org
  • Postman API Platform. Retrieved July 16, 2020, from https://www.postman.com
  • Su, W., Wong, W., & Chen, W. (2016). A survey of performance improvement by Group-based authentication in IoT. 2016 International Conference on Applied System Innovation (ICASI). DOI: https://www.doi.org/10.1109/icasi.2016.7539800
  • Şahinaslan, O. (2019). Encryption protocols on wireless IOT Tools. AIP Conference Proceedings. DOI: https://www.doi.org/10.1063/1.5095121
  • The Alliance for Internet of Things Innovation. (2019, October). IoT LSP Standard Framework Concepts, Release 2.9 AIOTI WG03 - IoT Standardization
  • TR-0025 Technical Report. (2018, March 12). TR-0025 V2.0.2 Application Developer Guide.
  • TS-0001 Technical Specification. (2016, August 30). TS-0001 V2.10.0 Functional Architecture.
  • TS-0003 Technical Specification. (2018, March 12). TS-0003 V2.12.1 Security Solutions.
  • TS-0009 Technical Specification. (2016, August 30). TS-0009 V2.6.1 HTTP Protocol Binding.
  • Yao, J., Wang, T., Chen, M., Wang, L., & Chen, G. (2016). GBS-AKA: Group-based Secure Authentication and Key Agreement for M2M in 4G network. 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). DOI: https://www.doi.org/10.1109/icccri.2016.15

Group-Based Authentication Methods in The OneM2M Ecosystem

Year 2022, Volume: 8 Issue: 4, 677 - 694, 15.12.2022
https://doi.org/10.28979/jarnas.1034534

Abstract

The essential element of the Internet of Things (IoT) environment, the number of devices has traditionally exceeded the number of devices connected to the Internet. This situation is considered positive for the IoT concept but still has negative consequences. Undoubtedly, the most prominent and most important among these results is the security of the devices and the constructed IoT environment. Group-based authentication and authorization methods are crucial to ensure the safety of many IoT devices and the environment. In this study, the “auth” mechanism that performs group-based authentication and authorization processes, serving from the first moment when the devices in the IoT environment are included in the system until they leave the system, has been developed. In the development process of the “auth” mechanism, the Mobius IoT platform, which is evaluated as a golden sample by the oneM2M global organization and developed as an open-source code, is taken as the basis. The “auth” mechanism tested in three different test environments, including simulation, physical, and cloud environments, were tested using five different test scenarios. By using the group management module provided by the IoT service platform and the “auth” mechanism's together, it has been observed that the computational overhead on the devices and the signal traffic in the environment provide up to 4 times efficiency according to performance measurements. With the development of the “auth” mechanism with a flexible structure, it can be operated independently from the IoT server platform, allow-ing interoperability between oneM2M-based IoT server platforms.

References

  • Aydin, Y., Kurt, G. K., Ozdemir, E., & Yanikomeroglu, H. (2020). A flexible and lightweight group Authentication Scheme. IEEE Internet of Things Journal, 7(10), 10277-10287. DOI: https://www.doi.org/10.1109/jiot.2020.3004300
  • Apache JMeter. Retrieved June 6, 2020, from http://jmeter.apache.org
  • Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based Access Authentication for MTC in LTE Networks. Security and Communication Networks, 8(17), 3282-3299. DOI: https://www.doi.org/10.1002/sec.1252
  • Chen, Y., Wang, J., Chi, K., & Tseng, C. (2010). Group-based Authentication and Key Agreement. Wireless Personal Communications, 62(4), 965-979. DOI: https://www.doi.org/10.1007/s11277-010-0104-7
  • Define IOT. (2015, May 25). Retrieved October 22, 2019, from https://iot.ieee.org/definition.html
  • Fu, A., Song, J., Li, S., Zhang, G., & Zhang, Y. (2016). A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A Networks. Security and Communication Networks. DOI: https://www.doi.org/10.1002/sec.1455
  • Gartner says 5.8 billion enterprise and automotive IoT endpoints will be in use in 2020. (2019, August 29). Retrieved February 12, 2020, from https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io
  • Gartner says worldwide IoT security spending will reach $1.5 billion in 2018. (2018, March 21). Retrieved May 07, 2019, from https://www.gartner.com/en/newsroom/press-releases/2018-03-21-gartner-says-worldwide-iot-security-spending-will-reach-1-point-5-billion-in-2018
  • IoT Analytics, State of the IoT 2018: Number of IoT devices now at 7B – market accelerating. (2018, August 08). Retrieved March 19, 2020, from https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b
  • IoT Analytics, State of the IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally. (2022, May 18). Retrieved June 22, 2022, from https://iot-analytics.com/number-connected-iot-devices
  • IoT OCEAN. (2017, July 9). Retrieved from http://developers.iotocean.org/archives/module/mobius
  • Jiang, R., Lai, C., Luo, J., Wang, X., & Wang, H. (2013). EAP-based group Authentication and Key Agreement Protocol for machine-type communications. International Journal of Distributed Sensor Networks, 9(11), 304601. DOI: https://www.doi.org/10.1155/2013/304601
  • RFC7519. (2015, May). Retrieved April 21, 2020, from https://datatracker.ietf.org/doc/html/rfc7519
  • KETI. (1991, August). Retrieved from https://www.keti.re.kr
  • Kim, J., Choi, S., Yun, J., & Lee, J. (2016). Towards the onem2M standards for building IoT ecosystem: Analysis, implementation, and lessons. Peer-to-Peer Networking and Applications, 11(1), 139-151. DOI: https://www.doi.org/10.1007/s12083-016-0505-9
  • Lai, C., Li, H., Li, X., & Cao, J. (2013). A novel group access authentication and key agreement protocol for machine-type communication. Transactions on Emerging Telecommunications Technologies, 26(3), 414-431. DOI: https://www.doi.org/10.1002/ett.2635
  • Lai, C., Li, H., Lu, R., & Shen, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE Networks. Computer Networks, 57(17), 3492-3510. DOI: https://www.doi.org/10.1016/j.comnet.2013.08.003
  • Lai, C., Lu, R., Zheng, D., Li, H., & (Sherman) Shen, X. (2016). GLARM: Group-based Lightweight Authentication Scheme for resource-constrained machine-to-machine communications. Computer Networks, 99, 66-81. DOI: https://www.doi.org/10.1016/j.comnet.2016.02.007
  • Li, J., Wen, M., & Zhang, T. (2016). Group-based Authentication and key agreement with Dynamic Policy Updating for MTC in LTE-A Networks2. IEEE Internet of Things Journal, 3(3), 408-417. DOI: https://www.doi.org/10.1109/jiot.2015.2495321
  • Modiri, M. M., Mohajeri, J., & Salmasizadeh, M. (2018). GSL-AKA: Group-based Secure Lightweight Authentication and key agreement protocol for M2M communication. 2018 9th International Symposium on Telecommunications (IST). DOI: https://www.doi.org/10.1109/istel.2018.8661145
  • MongoDB: The Application Data Platform. (2007). Retrieved May 04, 2020, from http://www.mongodb.com
  • nCube-Lavender. (2018, May 30). Retrieved from http://developers.iotocean.org/archives/module/ncube-lavender
  • nCube-Rosemary. (2018, May 31). Retrieved from http://developers.iotocean.org/archives/module/ncube-rosemary
  • nCube-Thyme Nodejs. (2018, July 2). Retrieved from http://developers.iotocean.org/archives/module/ncube-thyme-nodejs
  • OneM2M, the global community that develops standards for IoT. (2012). Retrieved from http://www.onem2m.org
  • Parne, B. L., Gupta, S., & Chaudhari, N. S. (2018). SEGB: Security Enhanced Group-based AKA protocol for M2M Communication in an IoT enabled LTE/LTE-A Network. IEEE Access, 6, 3668-3684. DOI: https://www.doi.org/10.1109/access.2017.2788919
  • Padmashree, M. G., Mallikarjun, Arunalatha, J. S., & Venugopal, K. R. (2022). GKEAE: Group Key Exchange and authentication with ECC in internet of things. Intelligent Systems, 1-10. DOI: https://www.doi.org/10.1007/978-981-19-0901-6_1
  • Passport.js. Retrieved February 13, 2020, from http://www.passportjs.org
  • Postman API Platform. Retrieved July 16, 2020, from https://www.postman.com
  • Su, W., Wong, W., & Chen, W. (2016). A survey of performance improvement by Group-based authentication in IoT. 2016 International Conference on Applied System Innovation (ICASI). DOI: https://www.doi.org/10.1109/icasi.2016.7539800
  • Şahinaslan, O. (2019). Encryption protocols on wireless IOT Tools. AIP Conference Proceedings. DOI: https://www.doi.org/10.1063/1.5095121
  • The Alliance for Internet of Things Innovation. (2019, October). IoT LSP Standard Framework Concepts, Release 2.9 AIOTI WG03 - IoT Standardization
  • TR-0025 Technical Report. (2018, March 12). TR-0025 V2.0.2 Application Developer Guide.
  • TS-0001 Technical Specification. (2016, August 30). TS-0001 V2.10.0 Functional Architecture.
  • TS-0003 Technical Specification. (2018, March 12). TS-0003 V2.12.1 Security Solutions.
  • TS-0009 Technical Specification. (2016, August 30). TS-0009 V2.6.1 HTTP Protocol Binding.
  • Yao, J., Wang, T., Chen, M., Wang, L., & Chen, G. (2016). GBS-AKA: Group-based Secure Authentication and Key Agreement for M2M in 4G network. 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). DOI: https://www.doi.org/10.1109/icccri.2016.15
There are 37 citations in total.

Details

Primary Language English
Subjects Software Architecture
Journal Section Makaleler
Authors

İbrahim Uğur Aba 0000-0002-0012-8640

Erhan Taşkın 0000-0001-8355-8963

Early Pub Date December 13, 2022
Publication Date December 15, 2022
Submission Date December 9, 2021
Published in Issue Year 2022 Volume: 8 Issue: 4

Cite

APA Aba, İ. U., & Taşkın, E. (2022). Group-Based Authentication Methods in The OneM2M Ecosystem. Journal of Advanced Research in Natural and Applied Sciences, 8(4), 677-694. https://doi.org/10.28979/jarnas.1034534
AMA Aba İU, Taşkın E. Group-Based Authentication Methods in The OneM2M Ecosystem. JARNAS. December 2022;8(4):677-694. doi:10.28979/jarnas.1034534
Chicago Aba, İbrahim Uğur, and Erhan Taşkın. “Group-Based Authentication Methods in The OneM2M Ecosystem”. Journal of Advanced Research in Natural and Applied Sciences 8, no. 4 (December 2022): 677-94. https://doi.org/10.28979/jarnas.1034534.
EndNote Aba İU, Taşkın E (December 1, 2022) Group-Based Authentication Methods in The OneM2M Ecosystem. Journal of Advanced Research in Natural and Applied Sciences 8 4 677–694.
IEEE İ. U. Aba and E. Taşkın, “Group-Based Authentication Methods in The OneM2M Ecosystem”, JARNAS, vol. 8, no. 4, pp. 677–694, 2022, doi: 10.28979/jarnas.1034534.
ISNAD Aba, İbrahim Uğur - Taşkın, Erhan. “Group-Based Authentication Methods in The OneM2M Ecosystem”. Journal of Advanced Research in Natural and Applied Sciences 8/4 (December 2022), 677-694. https://doi.org/10.28979/jarnas.1034534.
JAMA Aba İU, Taşkın E. Group-Based Authentication Methods in The OneM2M Ecosystem. JARNAS. 2022;8:677–694.
MLA Aba, İbrahim Uğur and Erhan Taşkın. “Group-Based Authentication Methods in The OneM2M Ecosystem”. Journal of Advanced Research in Natural and Applied Sciences, vol. 8, no. 4, 2022, pp. 677-94, doi:10.28979/jarnas.1034534.
Vancouver Aba İU, Taşkın E. Group-Based Authentication Methods in The OneM2M Ecosystem. JARNAS. 2022;8(4):677-94.


TR Dizin 20466




Academindex 30370    

SOBİAD 20460               

Scilit 30371                        

29804 As of 2024, JARNAS is licensed under a Creative Commons Attribution-NonCommercial 4.0 International Licence (CC BY-NC).