scispace - formally typeset
Journal ArticleDOI

A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications

Reads0
Chats0
TLDR
The original Nyberg's fast one-way accumulator is revised and a lightweight multicast authentication mechanism for small scale IoT applications is constructed and the property of absorbency is discovered that makes it very suitable for applications in which accumulated items are dynamic.
Abstract
Security is very important for Internet of Things (IoTs). As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. With the analysis of Nyberg's fast one-way accumulator and its security, we discover that it has the property of absorbency in addition to the one-way and quasi-communicative property that makes it very suitable for applications in which accumulated items are dynamic. In this paper, we revise the original Nyberg's fast one-way accumulator and construct a lightweight multicast authentication mechanism for small scale IoT applications. We analyze the security of the mechanism in detail. In addition, we evaluate seven performance aspects of the mechanism.

read more

Citations
More filters
Journal ArticleDOI

Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities

TL;DR: Wang et al. as mentioned in this paper proposed a privacy-preserving and efficient data aggregation scheme, which divides users into different groups, and each group has a private blockchain to record its members' data.
Journal ArticleDOI

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

TL;DR: A lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment is proposed, characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against the following attacks.
Journal ArticleDOI

Mutual Authentication in IoT Systems Using Physical Unclonable Functions

TL;DR: A security and performance analysis of the protocols shows that they are not only robust against different types of attacks, but are also very efficient in terms of computation, memory, energy, and communication overhead.
Journal ArticleDOI

IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios

TL;DR: An architecture targeting HTTP/CoAP services to provide an authorization framework, which can be integrated by invoking an external oauth-based authorization service (OAS), which is denoted as IoT-OAS is proposed.
Journal ArticleDOI

The Internet of Things: a security point of view

TL;DR: An in-depth overview of the security requirements and challenges for Internet of Things and discuss security solutions for various enabling technologies and implications to various applications is provided.
References
More filters
Journal Article

Security for Sensor Networks

TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Proceedings ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Book ChapterDOI

A Digital Signature Based on a Conventional Encryption Function

TL;DR: A new digital signature based only on a conventional encryption function (such as DES) is described which is as secure as the underlying encryption function -- the security does not depend on the difficulty of factoring and the high computational costs of modular arithmetic are avoided.
Journal ArticleDOI

Internet of things - new security and privacy challenges

TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Journal ArticleDOI

Internet of Things: Applications and Challenges in Technology and Standardization

TL;DR: The state-of-the-art of IoT is studied and the key technological drivers, potential applications, challenges and future research areas in the domain of IoT are presented.
Related Papers (5)