scispace - formally typeset
Search or ask a question
Book ChapterDOI

Mutual Authentication Scheme for the Management of End Devices in IoT Applications

TL;DR: Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services and this work provides three-factor authentication mechanism including perpetual and one-way hashing.
Abstract: IoT has started to penetrate in all walks of life starting from home to industrial applications. The number of internet connected devices is increasing every day. Data breaches against a huge amount of data evolving in it also in rise which makes security imperative. Message Queuing Telemetry Transport Protocol (MQTT) is one of the most widely used lightweight communication protocol for the Internet of Things (IoT) services. In this work, two-way communication using socket was adopted between node and gateway, and publish/subscribe-based communication was used between node and user. In order to ensure overall authorized access of the data from the devices, the proposed work provides three-factor authentication mechanism including perpetual and one-way hashing. Further, computational and storage analysis was performed, which proves that this scheme is suitable for resource-constrained devices and used to minimize the computational complexity, space, and bandwidth.
Citations
More filters
Book
01 Jan 2010
TL;DR: In this article, the authors present a spatial cloaking framework based on range search for nearest neighbor search (RNNS) for privacy protection in vehicular networks, and a contextual privacy management in Extended Role Based Access Control Model.
Abstract: Keynote Talks.- The UNESCO Chair in Data Privacy Research in Vehicular Networks.- Privacy Management for Global Organizations.- Data Privacy Management.- Obligation Language and Framework to Enable Privacy-Aware SOA.- Distributed Privacy-Preserving Methods for Statistical Disclosure Control.- Towards a Privacy-Preserving National Identity Card.- Using SAT-Solvers to Compute Inference-Proof Database Instances.- A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem.- A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search.- Visualizing Privacy Implications of Access Control Policies in Social Network Systems.- Contextual Privacy Management in Extended Role Based Access Control Model.- Autonomous and Spontaneous Security.- Dynamic Security Rules for Geo Data.- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking.- ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets).- Untraceable Tags Based on Mild Assumptions.- Security Threat Mitigation Trends in Low-Cost RFID Systems.- An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification.- DDoS Defense Mechanisms: A New Taxonomy.- RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems.- Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges.

61 citations

References
More filters
Journal ArticleDOI
TL;DR: The use of a lightweight protocol for communication with resource-constrained devices, MQTT, is proposed as an aid to integrate new devices in educational applications, specifically in those that use web standards such as Javascript to provide interactive user interfaces.

40 citations

Book ChapterDOI
Wenling Wu1, Shuang Wu, Lei Zhang, Jian Zou, Le Dong 
27 Nov 2013
TL;DR: The resistance of LHash against known attacks is evaluated and it is confirmed that LHash provides a good security margin, and its energy consumption evaluated by energy per bit is also remarkable.
Abstract: In this paper, we propose a new lightweight hash function supporting three different digest sizes: 80, 96 and 128 bits, providing preimage security from 64 to 120 bits, second preimage and collision security from 40 to 60 bits LHash requires about 817 GE and 1028 GE with a serialized implementation In faster implementations based on function \(T\), LHash requires 989 GE and 1200 GE with 54 and 72 cycles per block, respectively Furthermore, its energy consumption evaluated by energy per bit is also remarkable LHash allows to make trade-offs among security, speed, energy consumption and implementation costs by adjusting parameters The design of LHash employs a kind of Feistel-PG structure in the internal permutation, and this structure can utilize permutation layers on nibbles to improve the diffusion speed The adaptability of LHash in different environments is good, since different versions of LHash share the same basic computing module The low-area implementation comes from the hardware-friendly S-box and linear diffusion layer We evaluate the resistance of LHash against known attacks and confirm that LHash provides a good security margin

37 citations

Journal ArticleDOI
TL;DR: This study aims to identify fingerprint images through several steps and extract the features based on DCT technique and results include an efficient recognition using DCT.
Abstract: Biometric systems based on the fingerprint recognition are considered one of the most important identification techniques. It is a successful way to determine the identity of the person that cannot be faked or stolen easily. This study aims to identify fingerprint images through several steps and extract the features based on DCT technique. The fingerprint image is divided into sub-blocks and allows evaluating the statistical features from the DCT Coefficients .The matching process is implemented using the correlation between fingerprint images. The obtained results include an efficient recognition using DCT.These programs are implemented via MATLAB environment.

12 citations