Abstract

This disruptive era has had a significant impact on the development of technologies in human beings, such as the Internet of Things (IoT). IoT allows people and devices to transmit their data, and hence intelligent environments, such as intelligent healthcare systems, smart transportation, smart city, and so on, are invented. Unfortunately, the wireless-based communication used by IoT offers opportunities for an adversary to eavesdrop, delete, and alter the data transmitted to each device. In addition, the adversary can perform severe attacks, such as cloning, impersonation, and others. On the other hand, IoT opens a new challenge for achieving security properties in preserving privacy in untraceable and unclonable device movement. This article proposes the unclonable and untraceable sensor movement in distributed IoT environments to resolve the aforementioned problems. The informal and formal analyses are used to ensure that our proposed protocol has achieved security features and is withstood various attacks. A comparison with the related protocols in the computational complexity will make our proposed protocol suitable for the IoT environment.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.