Abstract

Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user's data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.

Highlights

  • The Internet of Things (IoT) is a great network technology that interconnects between innumerable devices

  • IoT is applied in many fields, as well as for water monitoring[1,2,3,4,5], healthcare[6,7,8,9], smart environment[10,11,12,13], smart home[14,15,16,17,18,19], and others

  • In order to secure the communication between IoT devices and cloud servers, Kalra and Sood[26] introduced a robust mutual authentication protocol that is founded on primitive of Elliptic Curve Cryptography (ECC)[27] and that uses HTTP cookies. After simulating their protocol under Automated Validation of Internet Security Protocols and Appplications (AVISPA) tools, they confirmed that their scheme can be used to provide the mutual authentication and it can resist against several attacks

Read more

Summary

Introduction

The Internet of Things (IoT) is a great network technology that interconnects between innumerable devices. Regardless of the great importance of IoT in our life, this technology has to resolve certain issues, for example, to link between hybrid resources and systems, the invention of new protocol is required. The two mechanisms used in IoT for preventing unauthorized users and devices to access to the sensed and captured values are the authentication and access control. For assuring this two security services, many researches have proposed various authentication protocols for IoT. In recent years, Ye et al.[23] suggested a new authentication and key exchanging protocol for IoTs devices.

Literature Review
Our Proposed Protocol
New sensor addition phase
User registration phase
Login and authentication phase
Password changing phase
Informal analysis
Formal security analysis under scyther tool
Performance Analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.