scispace - formally typeset
Book ChapterDOI

Mutual Authentication Scheme for the Management of End Devices in IoT Applications

TLDR
Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services and this work provides three-factor authentication mechanism including perpetual and one-way hashing.
Abstract
IoT has started to penetrate in all walks of life starting from home to industrial applications. The number of internet connected devices is increasing every day. Data breaches against a huge amount of data evolving in it also in rise which makes security imperative. Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services. In this work, two-way communication using socket was adopted between node and gateway, and publish/subscribe-based communication was used between node and user. In order to ensure overall authorized access of the data from the devices, the proposed work provides three-factor authentication mechanism including perpetual and one-way hashing. Further, computational and storage analysis was performed, which proves that this scheme is suitable for resource-constrained devices and used to minimize the computational complexity, space, and bandwidth.

read more

Citations
More filters
Book

Data privacy management and autonomous spontaneous security : 4th international workshop : DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24 - 25, 2009 : revised selected papers

Joaquin Garcia-Alfaro, +1 more
TL;DR: In this article, the authors present a spatial cloaking framework based on range search for nearest neighbor search (RNNS) for privacy protection in vehicular networks, and a contextual privacy management in Extended Role Based Access Control Model.
References
More filters
Journal ArticleDOI

Current research on Internet of Things (IoT) security: A survey

TL;DR: This paper presents an analysis of recent research in IoT security from 2016 to 2018, its trends and open issues, and the relevant tools, modellers and simulators.
Proceedings ArticleDOI

A Survey on Application Layer Protocols for the Internet of Things

TL;DR: This paper presents and compares existing IoT application layer protocols as well as protocols that are utilized to connect the “things” but also end-user applications to the Internet, and argues their suitability for the IoT by considering reliability, security, and energy consumption aspects.

The OAuth 1.0 Protocol

TL;DR: OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end- user) and a process for end-users to authorize third- party access to their server resources without sharing their credentials, using user- agent redirections.
Journal ArticleDOI

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

TL;DR: A three-factor anonymous authentication scheme for WSNs in Internet of Things environments, where fuzzy commitment scheme is adopted to handle the user's biometric information and keeps computational efficiency, and also achieves more security and functional features.
Journal ArticleDOI

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks

TL;DR: This work presents a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry and presents a comprehensive heuristic security analysis to show that the protocol is secure against all the possible attacks and provides the desired security features.
Related Papers (5)