scispace - formally typeset
Book ChapterDOI

Mutual Authentication Scheme for the Management of End Devices in IoT Applications

TLDR
Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services and this work provides three-factor authentication mechanism including perpetual and one-way hashing.
Abstract
IoT has started to penetrate in all walks of life starting from home to industrial applications. The number of internet connected devices is increasing every day. Data breaches against a huge amount of data evolving in it also in rise which makes security imperative. Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services. In this work, two-way communication using socket was adopted between node and gateway, and publish/subscribe-based communication was used between node and user. In order to ensure overall authorized access of the data from the devices, the proposed work provides three-factor authentication mechanism including perpetual and one-way hashing. Further, computational and storage analysis was performed, which proves that this scheme is suitable for resource-constrained devices and used to minimize the computational complexity, space, and bandwidth.

read more

Citations
More filters
Book

Data privacy management and autonomous spontaneous security : 4th international workshop : DPM 2009, and second international workshop, SETOP 2009, St. Malo, France, September 24 - 25, 2009 : revised selected papers

Joaquin Garcia-Alfaro, +1 more
TL;DR: In this article, the authors present a spatial cloaking framework based on range search for nearest neighbor search (RNNS) for privacy protection in vehicular networks, and a contextual privacy management in Extended Role Based Access Control Model.
References
More filters
Journal ArticleDOI

Fingerprint-based remote user authentication scheme using smart cards

TL;DR: An authentication system, which does not require a password table to authenticate its users, is proposed, and introducing smart card and fingerprint verification so that the scheme can withstand message replaying attack and impersonation.
Journal ArticleDOI

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

TL;DR: This work proposes a robust and lightweight authentication scheme for WMSNs, which meets the common security requirements, and keeps away user tracking from attackers, and is suitable for PHSs.
Journal ArticleDOI

A lightweight biometrics based remote user authentication scheme for IoT services

TL;DR: A lightweight biometric based remote user authentication and key agreement scheme for secure access to IoT services has been proposed, which makes use of lightweight hash operations and XOR operation.
Journal ArticleDOI

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks

TL;DR: The proposed two-factor authentication scheme for health-care with WMSNs is vulnerable to the off-line guessing attack, the user impersonation attack, and the sensor node capture attack, but an improved scheme is presented to overcome the disadvantages.
Proceedings ArticleDOI

Federated Identity and Access Management for the Internet of Things

TL;DR: This work examines the use of Federated Identity and Access Management (FIAM) approaches for the Internet of Things (IoT) and builds a prototype that uses OAuth 2.0 to enable access control to information distributed via MQTT.
Related Papers (5)