Abstract

In recent years, secure communication between the interconnected components of the internet of things has become an important and worrying issue due to some attacks on the IoT. The Internet of Things (IOT) is the integration of things with the world of the Internet, where this integration takes place by adding devices or programs to be smart and, as a result, they will be able to communicate with one another and participate in all elements of life quite efficiently. Accordingly, we've developed an authentication protocol for the IoT ecosystem; it's primary function is to ensure the safety of data exchange between the many devices that make up the IoT. Our proposed protocol is based on the elliptic curve cipher (ECC) algorithm, which greatly aids in protecting IoT components from physical assault. Our informal protocol analysis demonstrates that our solution not only protects users' privacy by concealing their devices' identities but also thwarts impersonation, counterattacks, and tracking and suggestion attacks directed at IoT devices. Security characteristics of the proposed protocol are also explicitly examined with the help of the ( SCYTHER) program. In addition, the effectiveness of the suggested protocol is evaluated by determining both its excess costs and its communication costs. Therefore, it appears that the protocol is vastly superior than the many other equivalent protocols by assessing its performance and security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call