Abstract

With technological advancements, the dependency on the Internet of things (IoT) has increased. The spectrum of IoT application domain becomes larger day by day. It converts the existing services into smart services. The evolution brings lot of security challenges hand in hand with IoT paradigms. This is due to the limitation of IoT devices like, low computational capabilities, small storage medium, less power back up and low processing speed, etc. To overcome these limitations, a proper authentication technique must be required to do the trust management in a heterogeneous IoT environment and secure all kinds of traffic. In this research document, a dynamic identity-based authentication approach is introduced for IoT environment, which utilizes very lightweight physical unclonable function, one-way hashing function and exclusive-OR(XOR) function to make the scheme lighter. Broadly accepted the Real or Random (RoR) model and the Burrows Abadi Needham logic (BAN logic) are used here, to check the security and the correctness of the devised protocol. In addition to that, the software simulation tool, Automated validation of Internet security protocols and applications (AVISPA) has proved that, the recommended protocol is safe and secure from various attacks. Furthermore, the comparative performance analysis exhibits the supremacy of the recommended scheme over the analogous schemes w.r.t computational power, memory usage, and communication overhead.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call