HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS

Authors

DOI:

https://doi.org/10.30837/ITSSI.2021.18.031

Keywords:

Internet of Things, asymmetric authentication, encryption algorithms, cryptographic keys, electronic certificates, digital signatures, cryptographic chips

Abstract

Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips. The aim of the article is to study the ways of potential use of cryptographic chips to ensure secure authentication of Internet of Things sites using asymmetric cryptography procedures. The article solves the following tasks: analysis of hardware support technologies for asymmetric cryptography of the Internet of Things; definition of secure procedures for asymmetric authentication of Internet of Things sites and their constituent elements: creation of certificates, verification of public and private keys. Research methods: method of structural and functional analysis and design of complex systems, methods of identification and authentication of information objects, cryptographic methods of information protection, methods of security analysis of distributed information systems. The novelty of the study is the analysis of hardware support technologies for asymmetric cryptography of Internet of Things with cryptographic chips and the definition of structural and functional schemes for the implementation of procedures for asymmetric authentication of Internet of Things. Distinctive features of the provided asymmetric authentication schemes and procedures are: ensuring an increased level of information security through secure storage of cryptographic keys, digital signatures, certificates, confidential data in a novelty security environment protected from external attacks and no need to store private keys on the host side. The results of the work are procedures and schemes of application of cryptomicrops of asymmetric authentication to ensure the protection of Internet of Things. Analysis of the functioning of the presented schemes allowed to draw the following conclusions. The proposed structural and functional schemes for the implementation of procedures for asymmetric authentication of Internet of Things using cryptographic chips give the user an easy opportunity to implement cryptography without expertise in this field. These chips use the ECDSA digital signature computing and verification hardware with elliptical curve advantages, as a proven and reliable authentication algorithm, and the ECDH symmetric encryption session key generation unit. The provided schemes and procedures support three components of information security, namely: confidentiality, integrity and authenticity of data. Examples of potential applications of the provided schemes and procedures can be implemented using any asymmetric authentication chip, but it is recommended that they be used to generate encryption session keys and where digital signatures are required to verify data and code for integrity and authenticity.

Author Biographies

Petro Klimushyn, Kharkiv National University of Internal Affairs

 Candidate of technical science, associate professor

Tetiana Solianyk, Kharkiv National University of Internal Affairs

Candidate of technical science, associate professor

Oleksandr Mozhaev, Kharkiv National University of Internal Affairs

 Doctor of technical science, professor

Vitalii Nosov, Kharkiv National University of Internal Affairs

Candidate of technical science, associate professor

Tetiana Kolisnyk, Department Kharkiv National University of Internal Affairs

Candidate of pedagogical science, associate professor

Vasily Yanov, Kharkiv National University of Internal Affairs

 Candidate of technical science, associate professor

References

Falk, R., Fries, S. (2016), "Advanced Device Authentication: Bringing Multi-Factor Authentication and Continuous Authentication to the Internet of Things", CYBER 2016: The First International Conference on Cyber-Technologies and Cyber-Systems, P. 69–74.

Wu, D. J., Taly, A., Shankar, A., Boneh, D. (2017), "Privacy, Discovery, and Authentication for the Internet of Things", Computer Science. Cryptography and Security, available at: https://arxiv.org/abs/1604.06959 (last accessed 21.05.2021).

Yavari, M., Safkhani, M., Kumari, S., Kumar, S., Chen, C.-M. (2020), "An Improved Blockchain-Based Authentication Protocol for IoT Network Management", Security and Communication Networks, Vol. 2020, P. 16. DOI:10.1155/2020/8836214.

Tian, Z., Yan, B., Guo, Q., Huang, J., Du, Q. (2020), "Feasibility of Identity Authentication for IoT Based on Blockchain", Procedia Computer Science, Vol. 174, P. 328–332. DOI: 10.1016/j.procs.2020.06.094.

CryptoAuthentication™ Family, available at: https://www.microchip.com/en-us/products/security-ics/cryptoauthentication-family (last accessed 21.11.2021).

Krivchenko, I. (2015), "Hardware-protected microcircuits of the CryptoAuthentication family: potential applications of АТЕССx08А", Components and technologies, No. 11, P. 57–64.

Klimushin, P., Solianyk, T., Kolisnyk, T., Mozhaev, O. (2021), "Potential application of hardware protected symmetric authentication microcircuitsto ensure the securityof internet of things", Advanced Information Systems, Vol. 5, No.3, P. 103 111.

Puleko, I. V., Chumakevich, V. O. (2019), "IoT sensors with time representation of measuring information", available at: https://conf.ztu.edu.ua/wp-content/uploads/2019/06/44.pdf (last accessed 21.11.2021).

Sovin, Y. R., Nakonechny, Y. M., Opirsky, I. R., Stakhiv, M. Yu. (2018), "Analysis of hardware support for cryptography in IoT devices", Ukrainian Scientific Journal of Information Security, Vol. 24, Issue 1, P. 36–48.

Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M. (2020), "IoT Privacy and Security: Challenges and Solutions", Appl. Sci., No. 10 (12), P. 17. DOI: 10.3390/app10124102.

Asangkhanwa, Y., Ii, R., Syrov, A. (2019), "Improving the security level of the edge nodes of the Internet of things using microchip ATECC608A microcircuits", Electronics NTB, No. 7 (00188), P. 60-64. DOI: 10.22184/1992-4178.2019.188. 7.60.64.

Shlykov, D. I. (2018), "About the fast implementation of the AES cipher in the Sdicrypt library", Information systems, No. 3 (53), P. 34–40.

Crinon, G. (2021), "Internet of Things security: existing problems and their solutions", available at: https://controleng.ru/wp-content/uploads/In_08.pdf (last accessed 21.11.2021).

Gnusov, Y. B., Klimushin, P. S., Kolisnyk, T. P., Mozhayev, M. O. (2020), "Analysis of microcontroller modeling systems with additional modules of cryptographic information protection", Bulletin of the National Technical University "KhPI". Series: Systems Analysis, Management and Information Technology: Coll. Science. etc., No. 1 (3), P. 79–84. DOI: 10.20998 /2079-0023.2020.01.14.

Microchip Technology (2017), "ATECC508A CryptoAuthentication Device Complete Data Sheet", available at: https://seltok.com/ upload/iblock/ 217/2177fef7a5c972d17d5781fce434236b.pdf

Downloads

Published

2022-04-25

How to Cite

Klimushyn, P., Solianyk, T., Mozhaev, O., Nosov, V. ., Kolisnyk, T. ., & Yanov, V. . (2022). HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (4 (18), 31–39. https://doi.org/10.30837/ITSSI.2021.18.031