Abstract

This disruptive era has had a significant impact on the development of technologies in human beings, such as the Internet of Things (IoT). IoT allows people and devices to transmit their data, and hence intelligent environments, such as intelligent healthcare systems, smart transportation, smart city, and so on, are invented. Unfortunately, the wireless-based communication used by IoT offers opportunities for an adversary to eavesdrop, delete, and alter the data transmitted to each device. In addition, the adversary can perform severe attacks, such as cloning, impersonation, and others. On the other hand, IoT opens a new challenge for achieving security properties in preserving privacy in untraceable and unclonable device movement. This article proposes the unclonable and untraceable sensor movement in distributed IoT environments to resolve the aforementioned problems. The informal and formal analyses are used to ensure that our proposed protocol has achieved security features and is withstood various attacks. A comparison with the related protocols in the computational complexity will make our proposed protocol suitable for the IoT environment.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call