Mutual authentication

Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at the same time in an authentication protocol. It was previously referred to as “mutual entity authentication,”[1] as two or more entities verify the others' legality before any data or information is transmitted.[2]

Mutual authentication is a desired characteristic in verification schemes that transmit sensitive data, in order to ensure data security.[2][3][4] Mutual authentication is found in two types of schemes: username-password based schemes and certificate based schemes, and these schemes are often employed in the Internet of Things (IoT). Writing effective security schemes in IoT systems can become challenging, especially when needing schemes to be lightweight and have low computational costs. Mutual authentication is a crucial security step that can defend against many adversarial attacks,[5] which otherwise can have large consequences if IoT systems (such as e-Healthcare servers) are hacked. In scheme analyses done of past works, a lack of mutual authentication had been considered a weakness in data transmission schemes.[6]


Process steps and verification

Schemes that have a mutual authentication step may use different methods of encryption, communication, and verification, but they all share one thing in common: each entity involved in the communication is verified. If Alice wants to communicate with Bob, they will both authenticate the other and verify that it is who they are expecting to communicate with before any data or messages are transmitted. A mutual authentication process that exchanges user IDs may be implemented as follows:[1]

  1. Alice sends a message to Bob to show that Alice is a valid user.
  2. Bob verifies message:
    1. Bob checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
    2. The message is then unscrambled with Bob's secret key and Alice's ID.
      1. Bob checks if the message matches a valid user. If not, the session is aborted.
  3. Bob sends Alice a message back to show that Bob is a valid user.
  4. Alice verifies the message:
    1. Alice checks the format and timestamp. If either is incorrect or invalid, the session is aborted.
    2. Then, the message is unscrambled with Alice's secret key and Bob's ID.
      1. Alice checks if the message matches a valid user. If not, the session is aborted.
  5. At this point, both parties are verified to be who they claim to be and safe for the other to communicate with. Lastly, Alice and Bob will create a shared secret key so that they can continue communicating in a secure manner.

To verify that mutual authentication has occurred successfully, Burrows-Abadi-Needham logic (BAN logic) is a well regarded and widely accepted method to use, because it verifies that a message came from a trustworthy entity. BAN logic first assumes an entity is not to be trusted, and then will verify its legality.[2][3][7][8]

Defenses

Mutual authentication is an important factor in transmission schemes because it can protect a scheme against adversarial attacks, notably:

  • Man in the middle attack: Man-in-the-middle (MITM) attacks are when a third party wishes to eavesdrop or intercept a message, and sometimes alter the intended message for the recipient. The two parties openly receive messages without verifying the sender, so they do not realize an adversary has inserted themselves into the communication line. Mutual authentication can prevent MITM attacks because both the sender and recipient verify each other before sending them their message keys, so if one of the parties is not verified to be who they claim they are, the session will end.[9]
  • Replay attacks: A replay attack is similar to a MITM attack in which older messages are replayed out of context to fool the server. However, this does not work against schemes using mutual authentication[10] because timestamps are a verification factor that are used in the protocols.[11][12] If the change in time is greater than the maximum allowed time delay, the session will be aborted.[12] Similarly, messages can include a randomly generated number to keep track of when a message was sent.[11]
  • Spoofing attacks: Spoofing attacks rely on using false data to pose as another user in order to gain access to a server or be identified as someone else. Mutual authentication can prevent spoofing attacks because the server will authenticate the user as well, and verify that they have the correct session key before allowing any further communication and access.[12]
  • Impersonation attacks: When each party authenticates the other, they send each other a certificate that only the other party knows how to unscramble, verifying themselves as a trusted source. In this way, adversaries cannot use impersonation attacks because they do not have the correct certificate to act as if they are the other party.[7]

Mutual authentication also ensures information integrity because if the parties are verified to be the correct source, then the information received is reliable as well.[7]

Lightweight schemes vs. secured schemes

While lightweight schemes and secure schemes are not mutually exclusive, adding a mutual authentication step to data transmissions protocols can often increase performance runtime and computational costs.[3] This can become an issue for network systems that cannot handle large amounts of data or those that constantly have to update for new real-time data (e.g. location tracking, real-time health data).[3][10]

Thus, it becomes a desired characteristic of many mutual authentication schemes to have lightweight properties (e.g. have a low memory footprint) in order to accommodate the system that is storing a lot of data.[5] Many systems implement cloud computing, which allows quick access to large amounts of data, but sometimes large amounts of data can slow down communication. Even with edge-based cloud computing, which is faster than general cloud computing due to a closer proximity between the server and user,[7] lightweight schemes allow for more speed when managing larger amounts of data. One solution to keep schemes lightweight during the mutual authentication process is to limit the number of bits used during communication.[5]

Applications that solely rely on device-to-device (D2D) communication, where multiple devices can communicate locally in close proximities, removes the third party network. This in turn can speed up communication time.[13] However, the authentication still occurs through insecure channels, so researchers believe it is still important to ensure mutual authentication occurs in order to keep a secure scheme.[13]

Schemes may sacrifice a better runtime or storage cost when ensuring mutual authentication in order to prioritize protecting the sensitive data.[3][12]

Password-based schemes

In mutual authentication schemes that require a user's inputted password as part of the verification process, there is a higher vulnerability to hackers because the password is human-made rather than a computer-generated certificate. While applications could simply require users to use a computer-generated password, it is inconvenient for people to remember. User-made passwords and the ability to change one's password are important for making an application user-friendly,[1][14] so many schemes work to accommodate the characteristic. Researchers note that a password based protocol with mutual authentication is important because user identities and passwords are still protected, as the messages are only readable to the two parties involved.[15]

However, a negative aspect about password-based authentication is that password tables can take up a lot of memory space.[1][14] One way around using a lot of memory during a password-based authentication scheme is to implement one-time passwords (OTP), which is a password sent to the user via SMS or email. OTPs are time-sensitive, which means that they will expire after a certain amount of time and that memory does not need to be stored.[16]

Multi-factor authentication

Recently, more schemes have higher level authentication than password based schemes. While password-based authentication is considered as "single-factor authentication," schemes are beginning to implement smart card (two-factor)[14] or biometric-based (three-factor) authentication schemes. Smart cards are simpler to implement and easy for authentication, but still have risks of being tampered with.[14] Biometrics have grown more popular over password-based schemes because it is more difficult to copy or guess session keys when using biometrics,[8] but it can be difficult to encrypt noisy data.[16] Due to these security risks and limitations, schemes can still employ mutual authentication regardless of how many authentication factors are added.[8]

Certificate based schemes and system applications

Mutual authentication is often found in schemes employed in the Internet of Things (IoT), where physical objects are incorporated into the Internet and can communicate via IP address.[11] Authentication schemes can be applied to many types of systems that involve data transmission.[13] As the Internet's presence in mechanical systems increases, writing effective security schemes for large numbers of users, objects, and servers can become challenging, especially when needing schemes to be lightweight and have low computational costs. Instead of password-based authentication, devices will use certificates to verify each other's identities.

Radio networks

Mutual authentication can be satisfied in radio network schemes, where data transmissions through radio frequencies are secure after verifying the sender and receiver.[12][17]

Radio frequency identification (RFID) tags are commonly used for object detection, which many manufacturers are implementing into their warehouse systems for automation.[18] This allows for a faster way to keep up with inventory and track objects. However, keeping track of items in a system with RFID tags that transmit data to a cloud server increases the chances of security risks, as there are now more digital elements to keep track of.[18] A three way mutual authentication can occur between RFID tags, the tag readers, and the cloud network that stores this data in order to keep RFID tag data secure and unable to be manipulated.[18]

Similarly, an alternate RFID tag and reader system that assigns designated readers to tags has been proposed for extra security and low memory cost.[19] Instead of considering all tag readers as one entity, only certain readers can read specific tags. With this method, if a reader is breached, it will not affect the whole system. Individual readers will communicate with specific tags during mutual authentication, which runs in constant time as readers use the same private key for the authentication process.

Many e-Healthcare systems that remotely monitor patient health data use wireless body area networks (WBAN) that transmit data through radio frequencies.[12] This is beneficial for patients that should not be disturbed while being monitored, and can reduced the workload for medical worker and allow them to focus on the more hands-on jobs. However, a large concern for healthcare providers and patients about using remote health data tracking is that sensitive patient data is being transmitted through unsecured channels,[9] so authentication occurs between the medical body area network user (the patient), the Healthcare Service Provider (HSP) and the trusted third party.

Cloud based computing

e-Healthcare clouds are another way to store patient data collected remotely.[3] Clouds are useful for storing large amounts of data, such as medical information, that can be accessed by many devices whenever needed. Telecare Medical Information Systems (TMIS), an important way for medical patients to receive healthcare remotely, can ensure secured data with mutual authentication verification schemes.[13] Blockchain is one way that has been proposed to mutually authenticate the user to the database, by authenticating with the main mediBchain node and keeping patient anonymity.[20]

Fog-cloud computing is a networking system that can handle large amounts of data, but still has limitations regarding computational and memory cost.[21] Mobile edge computing (MEC) is considered to be an improved, more lightweight fog-cloud computing networking system,[21] and can be used for medical technology that also revolves around location-based data. Due to the large physical range required of locational tracking, 5G networks can send data to the edge of the cloud to store data. An application like smart watches that track patient health data can be used to call the nearest hospital if the patient shows a negative change in vitals.[7]

Fog node networks can be implemented in car automation, keeping data about the car and its surrounding states secure. By authenticating the fog nodes and the vehicle, vehicular handoff becomes a safe process and the car’s system is safe from hackers.[10]

Machine to machine verification

Many systems that do not require a human user as part of the system also have protocols that mutually authenticate between parties. In unmanned aerial vehicle (UAV) systems, a platform authentication occurs rather than user authentication.[3] Mutual authentication during vehicle communication prevents one vehicle's system from being breached, which can then affect the whole system negatively. For example, a system of drones can be employed for agriculture work and cargo delivery, but if one drone were to be breached, the whole system has the potential to collapse.[3]

See also

References

  1. Hsu, Chien-Lung, Hsiao-Chen Liu, and Ming-Tzu Chou. 2007. “Remote Mutual Authentication Scheme with Key Agreement Using Smart Cards.” International Mathematical Forum 2(1):1381–97. http://dx.doi.org/10.12988/imf.2007.07126.
  2. Chen, Yulei and Jianhua Chen. 2020. “A Secure Three-Factor-Based Authentication with Key Agreement Protocol for e-Health Clouds.” The Journal of Supercomputing: An International Journal of High-Performance Computer Design, Analysis, and Use 1–22. https://doi.org/10.1007/s11227-020-03395-8
  3. Chen, Liquan, Sijie Qian, Ming Lim, and Shihui Wang. 2018. “An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems.” China Communications 15(5):61–76. https://doi.org/10.1109/CC.2018.8387987.
  4. Chen, Chi-Tung, Cheng-Chi Lee, and Iuon-Chang Lin. 2020. “Efficient and Secure Three-Party Mutual Authentication Key Agreement Protocol for WSNs in IoT Environments.” Plos One 15(4). doi: 10.1371/journal.pone.0232277.
  5. Jan, Mian Ahmad, Fazlullah Khan, Muhammad Alam, and Muhammad Usman. 2019. “A Payload-Based Mutual Authentication Scheme for Internet of Things.” Future Generation Computer Systems 92:1028–39. http://dx.doi.org/10.1016/j.future.2017.08.035.
  6. Amin, Ruhul, Sk Hafizul Islam, Pandi Vijayakumar, Muhammad Khurram Khan, and Victor Chang. 2017. “A Robust and Efficient Bilinear Pairing Based Mutual Authentication and Session Key Verification over Insecure Communication.” Multimedia Tools and Applications 77(9):11041–66. doi 10.1007/s11042-017-4996-z.
  7. Chen, Chin-Ling, Mao-Lun Chiang, Hui-Ching Hsieh, Ching-Cheng Liu, and Yong-Yuan Deng. 2020. “A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing.” Wireless Personal Communications 113(1):575–98. https://doi.org/10.1007/s11277-020-07240-2.
  8. Sahoo, Shreeya Swagatika, Sujata Mohanty, and Banshidhar Majhi. 2019. “Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC.” Wireless Personal Communications 111(2):991–1017. https://doi.org/10.1007/s11277-019-06897-8.
  9. Sasikaladevi, N. and D. Malathi. 2019. “Energy Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve.” Wireless Personal Communications 109(4):2471–88. https://doi.org/10.1007/s11277-019-06693-4.
  10. Dewanta, Favian and Masahiro Mambo. 2019. “A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment.” IEEE Access 7:103095–114. https://doi.org/10.1109/ACCESS.2019.2931217.
  11. Melki, Reem, Hassan N. Noura, and Ali Chehab. 2019. “Lightweight Multi-Factor Mutual Authentication Protocol for IoT Devices.” International Journal of Information Security 19(6):679–94. doi: 10.1007/s10207-019-00484-5.
  12. Narwal, Bhawna and Amar Kumar Mohapatra. 2020. “SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks.” Wireless Personal Communications 113(4):1985–2008. https://doi.org/10.1007/s11277-020-07304-3.
  13. Lopes, Ana Paula G. and Paulo R. L. Gondim. 2020. “Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System.” Sensors 20(7):2072. https://doi.org/10.3390/s20072072.
  14. Karuppiah, Marimuthu and R. Saravanan. 2015. “Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme Using Smart Cards.” Journal of Discrete Mathematical Sciences and Cryptography 18(5):623–49. https://doi.org/10.1080/09720529.2015.1013693.
  15. Karuppiah, Marimuthu et al. 2018. “Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.” Mobile Networks and Applications 24(3):1046–62. https://doi.org/10.1007/s11036-018-1061-8.
  16. Sharma, Mohit Kr and Manisha J. Nene. 2020. “Two‐Factor Authentication Using Biometric Based Quantum Operations.” Security and Privacy 3(3). https://doi.org/10.1002/spy2.102.
  17. Choudhary, Karanjeet, Gurjot Singh Gaba, Ismail Butun, and Pardeep Kumar. 2020. “MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things.” Sensors 20(18):5166. https://doi.org/10.3390/s20185166.
  18. Anandhi, S., R. Anitha, and Venkatasamy Sureshkumar. 2020. “An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment.” Wireless Personal Communications 113(4):2339–61. https://doi.org/10.1007/s11277-020-07330-1.
  19. Guo, Fuchun, Yi Mu, Willy Susilo, and Vijay Varadharajan. 2017. “Privacy-Preserving Mutual Authentication in RFID with Designated Readers.” Wireless Personal Communications 96(3):4819–45. https://doi.org/10.1007/s11277-017-4430-x.
  20. Liu, Xiaoxue, Wenping Ma, and Hao Cao. 2019. “MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture.” IEEE Access 7:149282–98. https://doi.org/10.1109/ACCESS.2019.2947313.
  21. Liu, Xiaoxue, Wenping Ma, and Hao Cao. 2019. “NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.” Journal of Medical Systems 43(10). https://doi.org/10.1007/s10916-019-1444-9.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.