Abstract

The Internet of Things for data exchange (IoT) is the new age of communication technology. As the use of smart devices increases significantly, IoT services are becoming more accessible. Mutual authentication scheme and session key communication shows an essential role in ensuring secure data transmission between the IoT infrastructures and remote consumers. Security analysis is an essential part of testing against relevant security threats. It uses the AVISPA simulation tool to verify a security-specific work. Accelerate the expansion of millions of devices-FT-Generation (5G) cellular networks connected from device to device (IoT). To resolve these security vulnerabilities, this paper proposes a state-of-the-art three-factor user visibility scheme. The proposed scheme provides the desired aspects for the IoT environment, and its computational and communication costs are compatible with low-cost IoT devices. Contains solutions to significant distribution issues in the MTC environment. Besides, this method of authenticated and decentralized group vision is used in a variety of situations. The proposed approach addresses the need for faster automation of advanced Agile 6G networks supported by most networking IoT devices. The rapid expansion of machine and device, the use of a wide variety of smart applications such as Smart e-Healthcare, Smart Education, Intelligent Transport Systems, is proliferating. In these applications, various devices are identified using radio-frequency identification (RFID) tags. Data collected in different geographical locations used to transfer device application data to other remote or local objects. Although, as mentioned earlier, applications need different visualization levels to automatically read data stored in RFID tags embedded in an object/device. It leads to fake issues. Besides, RFID-based visualization carries a heavy computational burden, as RFID-tags have lower computational efficiency. For example, symmetry key cryptography has several anonymous RFID-based visual heuristic schemes designed with hash functions and lightweight cryptographic tools to solve these issues. Although, all of these works fail to meet the known safety and operational requirements. The proposed work provides RFID-based lightweight tags and secures more privacy, obscurity and inaccessible localization.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call