Book ChapterDOI
Mutual Authentication Scheme for the Management of End Devices in IoT Applications
S. Annashree Nivethitha,Chanthini Baskar,Manivannan Doraipandian +2 more
- Vol. 672, pp 221-231
TLDR
Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services and this work provides three-factor authentication mechanism including perpetual and one-way hashing.Abstract:
IoT has started to penetrate in all walks of life starting from home to industrial applications. The number of internet connected devices is increasing every day. Data breaches against a huge amount of data evolving in it also in rise which makes security imperative. Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services. In this work, two-way communication using socket was adopted between node and gateway, and publish/subscribe-based communication was used between node and user. In order to ensure overall authorized access of the data from the devices, the proposed work provides three-factor authentication mechanism including perpetual and one-way hashing. Further, computational and storage analysis was performed, which proves that this scheme is suitable for resource-constrained devices and used to minimize the computational complexity, space, and bandwidth.read more
Citations
More filters
Book
Data privacy management and autonomous spontaneous security : 4th international workshop : DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24 - 25, 2009 : revised selected papers
Joaquin Garcia-Alfaro,Dpm +1 more
TL;DR: In this article, the authors present a spatial cloaking framework based on range search for nearest neighbor search (RNNS) for privacy protection in vehicular networks, and a contextual privacy management in Extended Role Based Access Control Model.
References
More filters
Journal ArticleDOI
Current research on Internet of Things (IoT) security: A survey
TL;DR: This paper presents an analysis of recent research in IoT security from 2016 to 2018, its trends and open issues, and the relevant tools, modellers and simulators.
Proceedings ArticleDOI
A Survey on Application Layer Protocols for the Internet of Things
TL;DR: This paper presents and compares existing IoT application layer protocols as well as protocols that are utilized to connect the “things” but also end-user applications to the Internet, and argues their suitability for the IoT by considering reliability, security, and energy consumption aspects.
The OAuth 1.0 Protocol
TL;DR: OAuth provides a method for clients to access server resources on behalf of a resource owner (such as a different client or an end- user) and a process for end-users to authorize third- party access to their server resources without sharing their credentials, using user- agent redirections.
Journal ArticleDOI
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
TL;DR: A three-factor anonymous authentication scheme for WSNs in Internet of Things environments, where fuzzy commitment scheme is adopted to handle the user's biometric information and keeps computational efficiency, and also achieves more security and functional features.
Journal ArticleDOI
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
TL;DR: This work presents a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry and presents a comprehensive heuristic security analysis to show that the protocol is secure against all the possible attacks and provides the desired security features.
Related Papers (5)
ECC based inter-device authentication and authorization scheme using MQTT for IoT networks
Ankur Lohachab,Karambir +1 more