On the Resilience of Authentication Schemes in IoT Networks With Different Structural Topologies

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

2 Scopus Citations
View graph of relations

Author(s)

Related Research Unit(s)

Detail(s)

Original languageEnglish
Pages (from-to)389-400
Number of pages12
Journal / PublicationIEEE Transactions on Consumer Electronics
Volume70
Issue number1
Online published13 Nov 2023
Publication statusPublished - Feb 2024

Abstract

The concern of network security is one of the major factors preventing the development of IoT-based applications. Such security risks can be mitigated by adopting a proper authentication scheme. The lack of quantitative comparison increases the difficulty when choosing the authentication scheme. This paper presents an empirical study of the effectiveness of three authentication methods including the blockchain-based method, a newly joined competitor. This study does not solely focus on the scheme level security but also five common structural topologies in IoT networks. We conduct simulations of these topological networks under six attack strategies and evaluate their survival sizes and survival link ratios. The network vulnerability coefficient is also proposed to illustrate a network’s expected exploit rate providing quantitative results to compare among schemes. The blockchain-based method achieves a 57.68% to 225.28% improvement compared to a defenseless network and outperforms other traditional schemes in BA, NSW and GRID structured networks. The results indicate that the network topology can greatly affect the resilience of an authentication scheme. © 2023 IEEE.

Research Area(s)

  • Authentication, Blockchain, Blockchains, Complex network, Internet of Things, IoT Security, Network topology, Resilience, Security, Topology