Abstract

The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communicate with differentquestions through the worldwide framework of remote/wired Internet. The correspondence system among an expansive number of assetobliged gadgets that produce substantial volumes of information affects the security and protection of the included items. In thispaper, we propose a lightweight protocol for IoT authentication which based on two algorithms LA1 and RA1 which is used forauthentication and generating session key that is used for encryption.

Highlights

  • During the last decade, the growth in the number of Internet enabled devices has been considerable

  • A device can be inundated with messages in order to exhaust its battery supply, authentication has to be performed in an efficient manner and properly take into Iraqi Journal for Computers and Informatics (IJCI) Published by University of Information Technology and Communications (UOITC) account the device’s limited power, storage, and computing capabilities[8]

  • PROPOSED LIGHTWEIGHT PROTOCOL: In this work a new proposed protocol for authentication in Internet of Things (IoT) is proposed based on figure (1) architecture two algorithm are proposed inside this protocol (LA1 algorithm) for verification and authentication between the device and the IoT network, (RA1 algorithm) for generating secure key for encryption which used for encrypting the data by proper encryption method the device should be authenticated to connect to the IoT net-work and for connecting to the cloud network and send the data encryption operation should be applied the encryption key is calculated mutually between the IoT device and the network

Read more

Summary

INTRODUCTION

The growth in the number of Internet enabled devices has been considerable. This term tries to define a future Internet where the growth in the number of device continues and almost all electronic devices have Internet connectivity This growth is not limited to usercontrolled devices, and includes machine to machine (M2M) communication, such as smart sensor systems. All of these Internets connected devices will have a representation in the Internet either in the form of an IP address or some other identifying information. Combining the fast growth of IoT devices with limited resources and less mature security options means that these constrained devices can become a prime target for attacks [6] If these issues are overlooked, sensitive systems including devices controlling people’s homes or industrial applications are at risk [10]. It is important that security is built into the IoT as early as possible, as retrofitting security solutions is more a difficult challenge [11]

THEORETICAL BACKGROUND
PROPOSED LIGHTWEIGHT PROTOCOL:
Devices Identity Authentication
Key Generating Algorithm in RA1
Comparison in IOT authentication
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call