Aggregated-Proof Based Hierarchical Authentication Scheme For The Internet of Things
Aggregated-Proof Based Hierarchical Authentication Scheme For The Internet of Things
Abstract—The Internet of Things (IoT) is becoming an attractive system paradigm to realize interconnections through the physical,
cyber, and social spaces. During the interactions among the ubiquitous things, security issues become noteworthy, and it is
significant to establish enhanced solutions for security protection. In this work, we focus on an existing U2IoT architecture (i.e., unit
IoT and ubiquitous IoT), to design an aggregated-proof based hierarchical authentication scheme (APHA) for the layered networks.
Concretely, 1) the aggregated-proofs are established for multiple targets to achieve backward and forward anonymous data
transmission; 2) the directed path descriptors, homomorphism functions, and Chebyshev chaotic maps are jointly applied for mutual
authentication; 3) different access authorities are assigned to achieve hierarchical access control. Meanwhile, the BAN logic formal
analysis is performed to prove that the proposed APHA has no obvious security defects, and it is potentially available for the U2IoT
architecture and other IoT applications.
1 INTRODUCTION
2 RELATED WORK
2.1 System Security
Roman et al. [4] pointed out that the traditional security
mechanisms may not be competent for the heterogeneous
networks, therefore improved mechanisms should be
designed according to the IoT infrastructures. Particu-
larly, the authors introduced cryptology based guidance
to address the security challenges, referring to the iden-
tity management, trust governance frameworks, fault tol-
erance, cryptography protocol, identity ownership, and
privacy preservation.
Lampropoulos and Denazis [5] focused on the identity
management in future Internet to analyze the identification
Fig. 1. The U2IoT architecture. and authentication issues in the user-centric, federations,
and other orthogonal systems. Furthermore, a distributed
safeguard for the U2IoT architecture to realize secure dynamic identity mapping, association N’ discovery system
interactions. (DIMANDS) was established to achieve cross-federation
Towards the U2IoT architecture, a reasonable authenti- service delivery, and to authenticate an unknown entity in a
cation scheme should satisfy the following requirements. foreign network and online service payment. The proposed
1) Data CIA (i.e., confidentiality, integrity, and availability): DIMANDS can achieve trusted and secure associations in
The exchanged messages between any two legal entities heterogeneous contexts.
should be protected against illegal access and modifica- Heer et al. [6] considered IP-based IoT, discussed the
tion. The communication channels should be reliable for applicability and limitations of current Internet protocols,
the legal entities. 2) Hierarchical access control: Diverse and presented a thing lifecycle based security architec-
access authorities are assigned to different entities to pro- ture for the IP networks. Thereinto, security architecture,
vide hierarchical interactions. An unauthorised entity node security model, and security bootstrapping are con-
cannot access data exceeding its permission. 3) Forward sidered in the security solution. Moreover, the authors
security: Attackers cannot correlate any two communica- pointed that the security protocols should fully consider
tion sessions, and also cannot derive the previous inter- the resource-constrained heterogeneous communication
rogations according to the ongoing session. 4) Mutual environments. Meca et al. [7] proposed a security archi-
authentication: The untrusted entities should pass each tecture based on the host identity protocol (HIP) and
other’s verification so that only the legal entity can access multimedia Internet keying protocols to enhance secure
the networks for data acquisition. 5) Privacy preservation: network association and key management.
The sensors cannot correlate or disclose an individual Ning et al. [8] addressed the cyber-entity security to pres-
target’s private information (e.g., location). Considering ent the recommended security approaches according to a
above security requirements, we design an aggregated- cyber-entity’s activity cycle, and further established a secure
proof based hierarchical authentication scheme (APHA) interaction solution for three scenarios (i.e., secure data
for the unit IoT and ubiquitous IoT respectively, and the access interaction, privacy-preserving data sharing interac-
main contributions are as follows: tion, and secure access authority transfer interaction).
1) Aggregated-proofs are established by wrapping
multiple targets’ messages for anonymous data 2.2 Network Security
transmission, which realizes that individual infor- Hancke et al. [9] identified the security challenges for the
mation cannot be revealed during both backward user-oriented RFID systems in the IoT, and the major chal-
and forward communication channels, lenges (e.g., privacy, ownership, data integrity, application
2) Directed path descriptors are defined based on integrity, and security standardization) should be enhanced
homomorphism functions to establish correlation to achieve universal security. Yan and Wen [10] applied a
during the cross-layer interactions. Chebyshev cha- mobile RFID security protocol to guarantee the mobile RFID
otic maps are applied to describe the mapping rela- networks, and a trust third party (TTP) based key manage-
tionships between the shared secrets and the path ment protocol is introduced to construct a secure session
descriptors for mutual authentication, key. Toumi et al. [11] focused on the integration of RFID
3) Diverse access authorities on the group identifiers tags into IP networks, and proposed a HIP address transla-
and pseudonyms are assigned to different entities tion scheme. The scheme provides address translation serv-
for achieving the hierarchical access control through ices between the tag identifiers and IP addresses, which
the layered networks. presents a prototype of the cross-layer IoT networks. Chang
The remainder of the paper is organized as follows. and Chen [12] reviewed the trust-based mechanisms (e.g.,
Section 2 reviews the related work in the IoT security. cryptographic, and authentication) in WSNs. Raza et al. [13]
Section 3 presents the layered system model, and intro- presented Lithe, which is an integration of datagram trans-
duces the proposed authentication scheme. Section 4 port layer security (DTLS) and constrained application
introduces the BAN logic based formal analysis. Finally, protocol (CoAP) to protect the transmission of sensitive
Section 5 draws a conclusion. information in the IoT.
NING ET AL.: AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS 659
TABLE 1 TABLE 2
The Shared Secrets Distribution Notations
A homomorphism encryption algorithm can be designed as Accordingly, a set of Chebyshev polynomials are
follows [23]. assigned to represent the relationships of the group identi-
fiers/pseudonyms and directed path descriptors:
1) Choose two large prime numbers p and q. and let
n ¼ pq, in which n is a public number, and p and q
For T lTj ð:Þ: gidSb T lTj F pbj ðmod qÞ;
are private numbers. j
2) A real number x is in a plaintext with the effective For T lSb ð:Þ : gidTj T lSb F pb ðmod qÞ;
decimal digits d for g1 ðxÞ ¼ 10d x. Here, jg1 ðxÞj For T lDCa ð:Þ: PIDTj T lDCa F pja ðmod qÞ;
ðp 1Þ=2, and g2 ðg1 ðxÞÞ 2 Zp . Define a homomor- PIDSb T lDCa F pba ðmod qÞ;
phism function F : F ðxÞ ¼ g2 ðg1 ðxÞÞkðp1Þþ1 mod
gidiDC T lDCa F pia ðmod qÞ;
n ¼ C. a
For T liDC ð:Þ: PIDDCa T liDC F p ðmod qÞ;
3) The inverse operation F 1 ð:Þ satisfies that: For T lnDC ð:Þ: gidDCa T lnDC F
i
pn i ðmod qÞ;
a
F 1 ðF ðxÞÞ ¼ g1 2 ðc mod pÞ=10 ¼ x.
d
PIDiDC T lnDC F pn ðmod qÞ:
For fx; yg 2 R and fg1 ðxÞ; g1 ðyÞg ðp 1Þ=4; F ðx þ yÞ ¼
F ðxÞ þ Fp ðyÞ holds.ffi Similarly, for fx; yg 2 R and fg1 ðxÞ;
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
g1 ðyÞg ðp 1Þ=2; F ðxyÞ ¼ F ðxÞF ðyÞ holds. Besides, the group identifiers {gidiDC ; gidDCa } can be
N1
The homomorphism function F ð:Þ is applied to describe respectively extended into fgidniDC g (i.e., {gid1iDC ; . . . ; gidiDC })
and fgidDCa g (i.e., {gidDCa ; . . . ; gidDCa }) for fN1 ; N2 g 2 N
n 1 N2
the relationships of the directed path descriptors. For
instance, the pairwise path descriptors {pbj ; pjb } are respec- and fgidniDC ; gidnDCa g 2 Zq2 . There are the following relation-
tively owned by {Tj ; Sb }, and satisfy the following relation- ships for x 2 fiDC; DCa g and y 2 fhDCa ; ’nDC g:
ships, in which the secrets Cjb and Cbj are owned by {Tj ; Sb }
for Cjb ¼ Cbj 2 R . Here, Tj can obtain a mirroring path Y
N2
n
F pbj pjb ¼ F pbj F pjb ¼ Cjb ¼ Cbj ; In the trust model, nDC is an only entity trusted by all
the other entities (i.e., Tj ; Sb ; DCa ; iDC). In the unit IoT, DCa
F pja þ pbj ¼ F pja þ F pbj ¼ F pjb
aj : is trusted by {Tj ; Sb }, and is under iDC’s default jurisdiction.
In the ubiquitous IoT, iDC and nDC have relatively inde-
Towards the Chebyshev polynomials. pendent jurisdictions on DCa .
The Chebyshev chaotic maps can be applied for authenti-
cation [24], [25]. Assume that T l ðmÞ is a Chebyshev polyno- 3.2 The Authentication Protocol in the Unit IoT
mial in l of degree m, and T l ðmÞ : ½1; 1 ! ½1; 1 is Fig. 2 shows an interaction among {DCa ; Sb ; Tj }, in which Tj
defined as T l ðmÞ ¼ cosðl arccosðmÞÞ. The recurrence rela- represents multiple targets {T1 ; . . . ; TJ }.
tionships of Chebyshev polynomials are as follows:
3.2.1 Challenge-Response between Sb and Tj , and Sb ’s
T 0 ðmÞ ¼ 1; T 1 ðmÞ ¼ m; Verification on Tj
T l ðmÞ ¼ cosðl arccosðmÞÞ; ðl 2Þ: Sb generates a random number rSb , extracts its temp iden-
tity flag FSb , and transmits rSb kFSb to Tj as a challenge to
Let the degrees {l1 ; l2 } be positive integer numbers. The initiate a new session. Upon receiving the messages, Tj
Chebyshev polynomials T l1 ðmÞ and T l2 ðmÞ (m 2 ½1; 1) first ascertains Sb ’s identity by searching the matched iden-
satisfy the semigroup and chaotic properties: tity flag FSb , generates a random number rTj , and extracts a
set of values {FTj ; gidTj ; PIDTj ; Cja ; Cjb ; paj ; pbj }, in which
T l ðmÞ ð2mT l1 ðmÞ T l2 ðmÞÞ ðmod qÞ ; ðl 2Þ; {Cja ; Cjb } are shared secrets, and {paj ; pbj } are directed path
T l1 ðT l2 ðmÞÞ T l1 l2 ðmÞ T l2 ðT l1 ðmÞÞ ðmod qÞ: descriptors. Thereafter, Tj computes a positive integer
x ¼ ½rSb ðmod eÞ for e 2 N as the maximum degree of a
NING ET AL.: AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS 661
Chebyshev polynomial T x ð:Þ. Tj updates {paj ; pbj ; gidTj ; PIDSb T lDCa ðF ðpba ÞÞ ðmod qÞ are applied for verification.
PIDTj } into {p0a 0b 0 0
j ; pj ; gidTj ; PIDTj }: If MS‘ b ¼ MSb holds, DCa will regard Sb as a legal sensor;
a a otherwise, the APHA will terminate.
p0a
j ¼ T x Cj =F pj ðmod qÞ; DCa derives gidTj kVTj by an inverse operation J1 ð:Þ,
0b
b b and checks Tj by re-computing VT‘j ¼ HðrTj kPID0‘Sb Þ. If
pj ¼ T x Cj =F pj ðmod qÞ;
VT‘j ¼ VTj holds, DCa will regard Tj as a legal target; other-
gid0Tj ¼ T x ðgidTj Þ ðmod qÞ; wise, the APHA will terminate:
PID0Tj ¼ T x ðPIDTj Þ ðmod qÞ :
gidTj kVTj ¼ J1
j APb H rSb kPID0‘Sb :
Tj computes MTj and VTj , in which MTj is an authentica-
tion operator, and VTj is further used to establish the back-
ward aggregated-proof APb : 3.2.3 Forwards Aggregated-Proof Response and Tj ’s
Verification on Sb
MTj ¼ H rSb kgid0Tj ; DCa continues to extract {gidSb ; PIDSb ; PIDTj ; pjb
aj } to com-
j
VTj ¼ H rTj kPID0Tj : pute VDC a
by the HMAC function:
j
VDC ¼ Hpjb ððrTj krSb Þ gidSb Þ:
Tj transmits rTj kFTj kp0a 0b a
j kpj kMTj kVTj to Sb . Thereafter, Sb
aj
first ascertains Tj ’s identity by FTj , and locally re-computes DCa establishes a forward aggregated-proof APf by
gid0‘Tj . Theoretically, gid0‘Tj equals gid0Tj according to gidTj j
wrapping PIDTj kVDC , and transmits APf to Sb :
T lSb ðF ðpjb ÞÞ ðmod qÞ: a
j
APf ¼ JJj¼1 PIDTj kVDC HðPIDSb Þ:
gid0‘Tj ¼ T lSb p0bj ðmod qÞ: a
3.3.1 Challenge-Response between DCa and iDC the updated values {p0ia ; p0n 0 0
a ; PIDDCa ; gidDCa } for further
DCa generates a random number rDCa , extracts its iden- authentication:
tity flag FDCa , and transmits rDCa kFDCa to query iDC.
Upon receiving the messages, iDC ascertains DCa ’s iden- p0ia ¼ T v Cia =F ðpai ÞÞ ðmod qÞ;
tity by searching the matched FDCa . Thereafter, iDC p0n
a ¼ T v ðCa =F ðpa ÞÞ ðmod qÞ;
n n
generates a random number riDC , and extracts PID0DCa ¼ T v ðPIDDCa Þ ðmod qÞ;
{FiDC ; gidiDC ; Cia ; pai }. iDC further computes an integer
gid0DCa ¼ T v ðgidDCa Þ ðmod qÞ :
u ¼ ½rDCa ðmod eÞ , and updates {pai ; gidiDC } into
0a 0
{pi ; gidiDC }:
DCa extracts gidiDC and fgidnDCa g to compute {MDCa ;
a a VDCa }, and transmits p0ia kp0n
a kMDCa kVDCa to iDC:
p0a
i ¼ T u Ci =F pi ðmod qÞ;
0
gidiDC ¼ T u ðgidiDC Þ ðmod qÞ:
MDCa ¼ H riDC kPID0DCa ;
X
N2
n
VDCa ¼ gidiDC gid0DCa þ
N
iDC extracts the values fgidniDC g ¼ fgid1iDC ; . . . ; gidiDC
1
g, gidDCa rDCa ðmod q2 Þ:
the pseudonyms {PIDDCa ; PIDiDC }, and an authentication n¼1
key ka to compute {MiDC ; ViDC }. Afterwards, iDC transmits
riDC kFiDC kp0a
i kMiDC kViDC to DCa for authentication:
iDC locally re-computes PID0‘DCa ¼ T liDC ðp0ia Þ and MDC
‘
a
¼
0‘
HðriDC kPIDDCa Þ. According to PIDDCa T liDC ðF ðpai ÞÞ
ðmod qÞ; iDC verifies DCa by comparing whether MDC ‘
MiDC ¼ E ka ðrDCa PIDiDC Þ; a
equals MDCa . If it holds, iDC will regard DCa as a legal unit
X
N1
data center; otherwise, the APHA will terminate.
ViDC ¼ PIDDCa gid0iDC þ gidniDC rDCa mod q2 :
n¼1
3.3.4 nDC’s Verification on iDC and DCa
iDC extracts {Cin ; pni ; kn } to update {pni ; PIDiDC } into {p0n
i ;
3.3.2 DCa ’s Verification on iDC PID0iDC }, and computes UiDC . Thereafter, iDC transmits
DCa extracts {hDCa ; ka }, locally re-computes gid0‘iDC , and rDCa kriDC kFDCa kFiDC kp0n 0n
a kpi kUiDC to nDC for authentica-
derives PID‘iDC by decryption operation: tion:
n n
p0n
i ¼ T u Ci =F pi ðmod qÞ;
gid0‘iDC ¼ T lDCa p0a ðmod qÞ;
i
PID0iDC ¼ T u ðPIDiDC Þ ðmod qÞ;
PID‘iDC ¼ E 1
ka ðMiDC Þ rDCa : UiDC ¼ E kn ðriDC VDCa Þ HðrDCa kPID0iDC Þ:
iDC checks DCa by the following equation according nDC ascertains {iDC; DCa }’s identities according to
{FiDC ; FDCa }, and extracts {’nDC ; gidiDC ; PIDDCa ; Cni ; pin ; kn }
QN1 gidiDCgid
to T lDCa ðF ðpia ÞÞ ðmod qÞ and PIDiDC
ðh Þ
n
iDC ðmod q 2 Þ. If it holds, DCa will regard iDC to re-compute {PID0‘iDC ; gid0‘DCa ; VDC
‘
}:
n¼1 DCa a
as a legal industrial data center; otherwise, the APHA will
terminate: PID0‘iDC ¼ T lnDC p0n
i ðmod qÞ;
0‘
0n
? 0‘ gidDCa ¼ T lnDC pa ðmod qÞ;
ðhDCa ÞViDC ¼ ðhDCa ÞPIDDCa gidiDC
1
VDCa ¼ E kn UiDC H rDCa kPID0‘iDC riDC :
‘
ðPID‘iDC ÞriDC ðmod q2 Þ:
iDC and DCa as legal entities; otherwise, the APHA will industrial data center with the appointed group
terminate: identifier can access DCa ’s data.
For iDC. iDC owns DCa ’s pseudonym PIDDCa to
‘
VDC ? gidiDC gid0‘ realize that iDC can ascertain DCa ’s detailed identity
ð’nDC Þ a ¼ ð’nDC Þ DC a
rDCa
in an industry application.
ðPIDDCa Þ ðmod q2 Þ: For nDC. nDC owns access authorities on both unit
IoT and industrial IoT. DCa ’s pseudonym PIDDCa
Till now, DCa and iDC have established mutual authen- and iDC’s group identifier gidiDC are available to
tication, and nDC has authenticated {DCa ; iDC} as legal realize the centralized management.
entities. Thereinto, iDC and nDC have different access
authorities on DCa ’s group identifier and pseudonym to
3.4.3 Forward Unlinkability
achieve hierarchical access control.
The pseudo-random numbers are generated as session-sen-
sitive operators to provide session freshness and randomi-
3.4 Security Properties zation. Additionally, the identity related values (e.g.,
3.4.1 Data Confidentiality and Data Integrity identify flags, group identifier, and pseudonym) are
Data confidentiality is mainly achieved by the Chebyshev dynamically updated during each session. Such variables
chaotic maps, in which the polynomials {T lTj ; T lSb ; T lDCa ; are applied to obtain the authentication operators (e.g.,
T liDC ; T lnDC } are defined to represent the relationships of VTj ; MSb ; MDCa , and ViDC ), the aggregated-proofs, and other
the group identifiers, pseudonyms and directed path intermediate variables (e.g., VSb ). The transmitted messages
descriptors. During the maps, the directed path descrip- are mainly computed based on the random numbers
tors are wrapped by the homomorphism function F ð:Þ. {rTj ; rSb ; rDCa ; riDC }, which make that the exchanged mes-
Besides, the pseudo-random numbers (i.e., rTj ; rSb ; rDCa ; sages can be regarded as dynamically variables with perfect
riDC ) are applied to obtain the degree of the Chebyshev forward unlinkability, and an attacker cannot correlate the
polynomials {T x ; T y ; T u ; T v } for enhancing session ongoing session with former sessions in the open channels.
randomization.
Data integrity is realized by the one-way hash and HMAC 3.4.4 Mutual Authentication
j
functions. In the unit IoT, {MTj ; MSb ; VTj ; VDC a
} are transmit- In the unit IoT, the mutual authentication is established
ted in the terms of Hð:Þ and Hpjb ð:Þ for identify declaration between Tj and Sb , and authentication operators are
aj
and verification. In the ubiquitous IoT, {MDCa ; UiDC } are applied to check the identity correctness and consistency.
The Chebyshev chaotic maps gidTj T lSb ðF ðpjb ÞÞ ðmod qÞ
respectively challenged to wrap PID0DCa and PID0iDC into
and gidSb T lTj ðF ðpbj ÞÞ ðmod qÞ are used for authentica-
hash functions for verifying DCa and iDC. Note that the
tion; The pairwise directed path descriptors {pjb ; pbj } can
one-way values apply pseudo-random numbers, which can be derived by F ðpbj pjb Þ ¼ F ðpbj ÞF ðpjb Þ ¼ Cbj ¼ Cjb ; The mir-
ensure that attackers cannot derive the private values for roring directed path descriptor jpjb aj j is obtained by
data corruption. F ðjpjb
aj jÞ ¼ F ðpb
j þ p j
a Þ ¼ F ðp b
j Þ þ F ðp j
a Þ.
In the ubiquitous IoT, hybrid authentications are estab-
lished among {DCa ; iDC; nDC}. The Chebyshev chaotic
3.4.2 Hierarchical Access Control maps {T lDCa ; T liDC ; T lnDC } are introduced for authentication.
Two-layered interactions of {Tj ; Sb ; DCa } and {DCa ; iDC; Besides, the group identifiers {gidiDC ; gidDCa } can be
N1 N2
nDC} are performed in relatively independent modes, dur- extended into {gid1iDC ; . . . ; gidiDC } and {gid1DCa ; . . . ; gidDC a
},
ing which DCa acts as a media to connect the unit IoT and which satisfy the pre-shared relationships with the corre-
ubiquitous IoT. According to the practical application sponding pseudonyms {PIDiDC ; PIDDCa }.
requirements, {Tj ; Sb ; DCa ; iDC; nDC} are assigned the dif-
ferent access authorities in the U2IoT.
3.4.5 Privacy Preservation
For Tj . Tj owns Sb ’s group identifier gidSb to ascertain The backward aggregated-proof APb is established by Sb to
the general group attribute, and ensure that only an wrap multiple targets {T1 ; . . . ; TJ }’s identity related values,
in-group sensor can access Tj ’s data. and the cascaded value JJj¼1 ðgidTj kVTj Þ is further XORed by
For Sb . Sb can only determine Tj ’s group identifier the hash value HðrSb kPID0Sb Þ for anonymous data transmis-
gidTj by the challenged pseudo-random identity flag sion. Here, APb covers the wrapped values T x ðPIDTj Þ and
FTj without obtaining the pseudonym PIDTj to T y ðPIDSb Þ. Here, the multi-element cascade operators
J 1
restrain Sb ’s access authority on Tj . Jj¼1 ð:Þ and its inverse operation Jj are defined for aggre-
For DCa . In the unit IoT, DCa owns reinforced access gation and derivation. The forward aggregated-proof APf
authorities on {Tj ; Sb }, and can ascertain {Tj ; Sb }’s is established by DCa to respond {T1 ; . . . ; TJ }. Note that APf
detailed group identifiers {gidTj ; gidSb } based on the includes the cascaded value ðPIDT1 kVDC 1
a
Þk; . . . ; k ðPIDTJ k
j
flags. Additionally, DCa can further determine J
VDC a
Þ, and {Tj } can respectively derive {PID Tj k VDCa } to
{Tj ; Sb }’s pseudonyms {PIDTj ; PIDSb } for further authenticate Sb .
management. In the ubiquitous IoT, DCa owns The aggregated-proofs have two main functions: one is to
iDC’s group identifier gidiDC to ensure that only the pack multiple targets’ challenges into a group, and the other
664 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 3, MARCH 2015
For Tj :
FTj ;FSb ;gidTj ;gidSb ;Cjb
P1.1: Tj j Sb () Tj ,
FTj ;gidTj ;PIDTj ;Cja
Tj j DC a () Tj;
P1.2: Tj j ] rTj ; FTj ; PID ; pa b
Tj j pj ;
;
is to pack DCa ’s responses into a group. Such aggregated P1.3: Tj j DCa j ) FTj ; gidTj ; PIDTj ; pjb
aj .
data transmission realizes that {Tj }’s individual identity
related information cannot be revealed, and attackers can- For Sb :
not derive individual sensitive information according to the FTj ;FSb ;gidTj ;gidSb ;Cb
j
intercepted messages. It turns out that only the legal unit P2.1: Sb j Tj () Sb ,
data center can derive each target’s identity information by FSb ;gidSb ;PIDSb ;Cba
APb , and only the legal target can derive its authorized Sb j DC a () Sb ;
fields by APf . P2.2: Sb j ] rSb ; FSb ; PID
S b
; p a
b ;
P2.3: Sb j DCa j ) FSb ; gidSb ; PIDSb .
For DCa :
4 FORMAL ANALYSIS WITH THE BAN LOGIC FTj ;gidTj ;PIDTj ;Ca
j
G1.3: Sb j Tj j pbj , According to M2.2: DCa C frDCa ; PIDiDC gka , it turns
G1.4: Sb j ] p0a 0b
j ; pj ; MTj ; APf , out that DCa receives frDCa ; PIDiDC gka , in which a secret
gidTj ;PIDTj
key ka is applied for establishing the ciphertext. Apply-
G1.5: Sb j DCa () Tj , K
G1.6: DCa j Tj j paj , ing the message-meaning rule (RM1): P j QP j ! P;P CfXgK
Q j X
, we
G1.7: DCa j Sb j pab . obtain that,
4.4 Logic Verification If DCa believes that Sb once conveyed the message
Logic verification is performed according to the formalized ðrDCa ; PIDiDC Þ; DCa will believe that Sb conveyed the
messages, initial assumptions, and the related rules of the sub-message PIDiDC . Till now, G2.1 has been proven,
BAN logic. and G2.7 can be achieved via the similar
Theorem 1.1. Tj believes that Sb conveyed pbj . procedures. u
t
Cjb
Proof: According to P1.1: Tj j Sb () Tj , it turns out that Theorem 2. Tj believes that VSb is fresh.
Tj believes that Cjb is a shared secret with Sb . Proof. According to P1.2: Tj j ]ðrTj ; PIDTj Þ, it turns out
According to M1.5: Tj C hrTj ; pjb iC j , it turns out that Tj that Tj believes that {rTj ; PIDTj } are fresh.
b
receives hrTj ; pjb iC j . Due to Cbj ¼ Cjb , we obtain that According to M1.5: Tj C VSb , in which VSb contains the
b
Tj C hrTj ; pjb iC b . Applying the message-meaning rule elements {pjb aj ; rTj ; rSb ; gidSb ; PIDTj ; PIDSb }, and it is ran-
j
(RM3): domized by {rTj ; PIDTj }. Applying the freshness rule
j ]ðXÞ
Y
(RF1): PPj ]ðX;Y Þ, we obtain that,
P j Q () P; P C hXiY
;
P j Qj X Tj j ]VSb :
we obtain that, If Tj believes that {rTj ; PIDTj } are fresh, Tj will also
Tj j Sb j rTj ; pjb : believe that VSb is fresh. Till now, G1.2 has been proven,
and G1.4, G2.2, and G2.4 can be achieved via the similar
procedures. u
t
If Tj believes that Cjb is a shared secret with Sb , and Tj
receives hrTj ; pjb iC j ; Tj will believe that Sb once conveyed Theorem 3. Sb believes that gidTj and PIDTj are secrets shared
b by {DCa ; Tj }.
the message ðrTj ; pjb Þ. Thereafter, applying the belief
rule (RB4): P Pj Q j ðX;Y Þ Proof. According to the secure communication channel
j Q j X , we obtain that,
between Sb and DCa , we obtain that,
Tj j Sb j pjb :
Sb j DCa j ) ðDCa j Þ;
If Tj believes that Sb conveyed the message Sb j DCa j ðDCa j Þ:
ðrTj ; pjb Þ; Tj will believe that Sb conveyed the sub-mes-
sage pjb . Note that the postulate is sound because the gidTj ;PIDTj
According to P3.1: DCa j Tj () DCa , it
rules for C guarantee that pjb was not just uttered by
turns out that DCa believes that {gidTj ; PIDTj } are
Tj . Till now, G1.1 has been proven, and G1.3, G1.6,
shared by {DCa ; Tj }. Applying the secret sharing rule
G1.7, G2.3, and G2.6 can be achieved via the similar
(RK3):
procedures. u
t
Theorem 1.2. DCa believes that iDC conveyed pai and PIDiDC . X
P j R () R0
Cai :
Proof. Similarly, according to DCa j iDC () P j R0 () R
X
Hong Liu is currently working toward the PhD Laurence T. Yang received the BE degree in
degree from the School of Electronic and Infor- computer science from Tsinghua University,
mation Engineering, Beihang University, China. China, and the PhD degree in computer science
She focuses on the security and privacy issues from the University of Victoria, Canada. He is a
in radio frequency identification, vehicle-to-grid professor in the School of Computer Science and
(V2G) networks, and internet of things. Her Technology at the Huazhong University of
research interests include authentication proto- Science and Technology, China, and in the
col design, and security formal modeling and Department of Computer Science, St. Francis
analysis. She is a student member of the IEEE. Xavier University, Canada. His research interests
include parallel and distributed computing, and
embedded and ubiquitous/pervasive computing.
His research is supported by the National Sciences and Engineering
Research Council and the Canada Foundation for Innovation. He is a
member of the IEEE.