Abstract

One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which joi...

Highlights

  • The Internet of Things (IoT) has increased the production of daily-life devices and technological advances are leading to a type of communication defined as machine-type communication (MTC), in which at least one of the parties is a machine or sensor that requires no human intervention

  • Our protocol clearly achieves the best performance for a small number of groups, as the number of devices increases

  • Two security simulations based on On-the-fly ModelChecker (OFMC)[17] and Constraint-Logic-based Attack Searcher (CL-AtSe)[8] were conducted

Read more

Summary

Introduction

The Internet of Things (IoT) has increased the production of daily-life devices and technological advances are leading to a type of communication defined as machine-type communication (MTC), in which at least one of the parties is a machine or sensor that requires no human intervention. A new authentication and key agreement protocol for congestion avoidance and better security has been designed; it consumes less bandwidth and fewer computational resources than other recent proposals It is characterized by a mutual authentication and key agreement protocol, based on devices grouping, according to criteria, as same application type, localization, same MTC server, among others. The contributions of this article are as follows: The proposal of a group authentication protocol to avoid the disadvantages of EPS-AKA1 protocol (standardized by 3GPP) that authenticates each device independently, generating high computational and communication costs and security issues. The remainder of the paper is organized as follows: section ‘‘Related work’’ addresses some related and relevant studies; section ‘‘Proposed protocol’’ presents the protocol, which involves a registration phase and mutual authentication and key agreement; section ‘‘Security analysis of the protocol’’ reports on some security analyses and comparisons to other protocols; section ‘‘Performance evaluation’’ describes the performance evaluation that considered computation and communication costs; conclusions and suggestions for future works are provided in section ‘‘Conclusion.’’

Related work
Conclusion
The AVISPA project
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.