Abstract

In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized in medical and everyday environments. With the promise of IoT's proactive systems, the integration of smart things into standard Internet creates several security challenges, because most Internet technologies, communication protocols and sensors are not designed to support IoT. Recent research studies have shown that launching security / privacy attacks against IoT active systems, in particular, Wearable Medical Sensor (WMS) systems, may lead to catastrophic situations and life-threatening conditions. Therefore, security threats and privacy concerns in the IoT area should be actively studied. This causes us in this paper to create a privacy authentication protocol for IoT end-devices on a four-layer structure that does not have the ability to accurately identify the device of request's sender so that some attacks can be minimized. We used the Blakley Sharing scheme to design a key generation and distribution system for secure communications between edge devices and end devices and examined the security properties of the protocol for the five common attacks in the IoT. The results of the experiments show that the proposed authentication protocol by the Blakley method is more efficient with increasing number of instructions in both fog structures and in a without fog structure, which shows a higher flexibility of the Blakley method than the Schemer because of the increasing number of instructions indicating increasing the number of nodes in the network.

Highlights

  • The Internet of things is one of the newest technologies in the present era

  • In [3] accountability, privacy, security, performance, and removal demands, which are dynamic for the authentication framework of the Internet of things end-devices by a weaker identity, are presented

  • In [6], the first two-way authentication security model, fully implemented for the Internet of Things (IoT), was defined in order to the existence standards of the Internet, especially the protocol for the datagram transferring layer security (DTLS) that is placed among the transfer layer, the plan

Read more

Summary

Introduction

The Internet of things is one of the newest technologies in the present era. But its functional domains have not yet been thoroughly analyzed. Unauthorized user disclosure of these critical attributes may cause some attacks on the device This structure is an efficient attitude to achieving five aims: productivity, security, privacy, dynamic removal, responsiveness. In this protocol, the Blakley sharing scheme for designing the key Engineering and Technology Journal creating, distributing system used for secure communications among edge -devices, end devices. In [6], the first two-way authentication security model, fully implemented for the IoT, was defined in order to the existence standards of the Internet, especially the protocol for the datagram transferring layer security (DTLS) that is placed among the transfer layer, the plan This scheme is in order to the RSA, planned for the IPV6 in personal domain networks with low-power (6LoWPANs). The protocol incorporates the accepted small set sign structure, Shamir’s secret sharing scheme as the forcible attitude for reaching five aims: privacy protection, security, proficiency, responsibility, active omission

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.