Abstract

The fast-growing technology has increased the demands of the Internet of Things (IoT) in different sectors, and the protection of security threats in IoT communication is a major challenge. This article presents a network diagram of the smart societies by enabling the sensor and camera technology. This article aims to provide and protect all kinds of security concerns during the transmission of sensed data to the cloud server. Therefore, a physically-unclonable-function-based authentication protocol has been proposed (called <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">EuDaimon</i> ) to establish secure communication among the entities involved. The EuDaimon protocol not only achieves the lightweight property, but also assists remote users who can access the cloud server as well as any sensor or camera after performing only one-time registration. The informal security analysis shows that the EuDaimon protocol is free from all kinds of security threats. The Scyther simulation ensures that the EuDaimon protocol has no security vulnerabilities. The performance comparison claims that the EuDaimon protocol is providing better performance although more participants are involved in the architecture.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call