Abstract

The spread of the Internet of Things (IoT) has caused a variety of devices to communicate with one another, producing enormous volumes of data and nurturing a linked ecosystem. However, the privacy of users, the integrity of the data, and secure authentication are seriously jeopardised by this link. In this context, we suggest a unique technique that makes use of identity-based anonymity and cryptographic authentication in IoT infrastructure in order to solve these problems.In order to facilitate safe communications between IoT devices, users, and service providers, our proposed mechanism creates a third-party authenticated protocol. This anonymity protection reduces the danger of unauthorised tracking and data exploitation by securing user names and usage patterns from possible attackers.The proposed system ensures the integrity and confidentiality of data transmitted between IoT devices and service providers by utilising sophisticated encryption algorithms. Additionally, it simplifies the authentication procedure, improving system efficiency overall without sacrificing security. The proposed technique into practise and assessed it using real-world IoT infrastructure scenarios, showcasing how well it protects user privacy and ensures safe communication. The findings show that the mechanism has a low computing cost and can withstand a range of security threats, making it a viable option for identity-based anonymity and authentication in IoT networks. Our approach makes a significant contribution to protecting user data and encouraging trustworthy interactions in IoT infrastructure as the IoT environment continues to grow.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call