Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach

Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach

Mihir Mehta, Kajal Patel
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJOSSP.310939
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things can be defined as collection of different physical that can converse with each other without any interruption. The IoT applications have the capability to change the current scenario of various domains such as health service, agriculture, and so on by offering services that can offer luxury to human life and also increases effectiveness. IoT follows open framework. Because of that it presents an opportunity to adversary for easily targeting system by performing various cyber-attacks. Existing well known cryptography solutions cannot be implemented in IoT as it has limitations in terms of resource ownership and also storage capacity. The authors have designed an efficient and secure multi-factor IoT authentication algorithm that is lightweight and provides the protection against different security threats such as MITM, replay, and location spoofing threat. Suggested work is tested on the tool AVISPA for the security validation. Communication and computational cost is low for the suggested work in comparison with the existing work.
Article Preview
Top

Architecture Of Internet Of Things

There are different beliefs and arguments for number of layers in IOT Architecture. There are two points mainly: five layer architecture and three layer architecture. Most of the researcher follows three tier architecture. They are (1) Top layer- Application layer (2) Middle layer- Transport layer and (3) Bottom layer- Transport layer. (J. Voas, 2018)

Sensing layer: It consists of different Sensors and actuators. Main task is to acquire the data and to compile the data collected from sensors. Preprocessing on data is also done at this layer. (J. Voas, 2018).

Transport layer: It is the centered layer. It accepts the collected data from Sensing layer and passes those data by using wired or wireless technology to the above layer. (J. Voas, 2018).

Application layer: It extends specific services to end users according to aim. Examples are Smart Agriculture, Smart Health care services, Manufacturing and so on. (J. Voas, 2018).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 1 Issue (2015)
Volume 5: 3 Issues (2014)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing