6,754 Hits in 5.0 sec

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication [article]

Syed W. Shah, Naeem F. Syed, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss
2020 arXiv   pre-print
In view of these challenges, we propose a novel, lightweight, and secure CA protocol that leverages communication channel properties and a tunable mathematical function to generate dynamically changing  ...  Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only  ...  In this paper, we presented our novel lightweight continuous authentication protocol for device-to-device communication.  ... 
arXiv:2010.05144v1 fatcat:2nw5mvh23zctbc3c7irihwv35u

A Lightweight Continuous Authentication Protocol for the Internet of Things

Yo-Hsuan Chuang, Nai-Wei Lo, Cheng-Ying Yang, Ssu-Wei Tang
2018 Sensors  
In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced.  ...  As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy  ...  As sensed data will be transmitted to gateways periodically, a lightweight authentication protocol for device-to-device communication is indeed required to preserve device energy and extend the battery  ... 
doi:10.3390/s18041104 pmid:29621168 pmcid:PMC5948497 fatcat:witzrxhv5zayhbikh6d3ysrh4m

Lightweight Security Protocols for Internet of Things: A Review

Deepti Rani, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
The paper also presents a comparative study of various lightweight security protocols for IoT, proposed by many researchers in recent years.  ...  Security protocols are designed to make secure communication within IoT enabled environment with less computation and storage cost.  ...  Yo-Hsuan Chuang et al. (2018) proposed a light-weight protocol for continuous authentication. The protocol was developed for gateway and sensing devices in IoT.  ... 
doi:10.30534/ijatcse/2019/58832019 fatcat:7wtxzomxcnfu7latkr3bl443e4

Survey and Analysis of Lightweight Authentication Mechanisms [chapter]

Adarsh Kumar, Deepak Kumar Sharma
2020 Cryptography - Recent Advances and Future Developments [Working Title]  
However, lightweight authentication protocols are suitable for passive RFID devices but do not provide full security.  ...  Symmetric and asymmetric protocols are more suitable for resourceful devices whereas lightweight and ultra-lightweight protocols are designed for resource constraint devices.  ...  This concept of group authentication is important for IoT. Authenticated devices in IoT increase the chances of secure communication in a network.  ... 
doi:10.5772/intechopen.94407 fatcat:x53aomwhyzcsxgnk46jcwxpd2q

Taxonomy towards Security using Encryption Algorithms in IOT-Based Healthcare System

Multiple algorithms have been devised earlier for wired, wireless, and M2M communication which are not feasible for IOT devices due to low battery life and short range devices.  ...  Due to that multiple attacks and threats arises, which creates number of solutions towards the same.  ...  For answering the same author introduces lightweight anonymous authentication protocol.  ... 
doi:10.35940/ijitee.b7578.129219 fatcat:ikhizk4dffeldm4u6sqtzky5b4

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Sanaz Kavianpour, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, Friso De Boer
2019 Journal of Computer Networks and Communications  
User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely.  ...  This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature.  ...  Vulnerable to the offline guessing and user tracking attack. Amin et al. [35] A lightweight authentication protocol for IoTenabled devices in a distributed computing environment.  ... 
doi:10.1155/2019/5747136 fatcat:dps6x5rtlrgznhi5rjuv4dtlji

Authentication of IoT device with the enhancement of One-time Password (OTP)

Sharon Chan Suet Yan, Alice Tang Su Wei, Jie Hui Bong, Quor Ling Teh, Shanmugapiriya Sivalingam, Shi Yee Khoo, Tahmid Mutashim Nafy
2021 Journal of IT in Asia  
Our contribution for this project is, we proposed the solution that a multi-factor authentication protocol to enhance the protocol proposed.  ...  In this paper we proposed a solution that is a multi-factor authentication protocol to enhance the protocol proposed by Li et al.  ...  This work is carried out as a short term research based class project.  ... 
doi:10.33736/jita.3841.2021 fatcat:2gn4n2spbfduzjpn2i5jygllky

Security in ad hoc networks and pervasive computing

Isaac Z. Wu, X.-Y. Li, M. Song, C.-M. Liu
2010 Security and Communication Networks  
The third paper, RFIDGuard: A Lightweight Privacy and Authentication Protocol for Passive RFID Tags, introduces a protocol which requires little computation and achieves both privacy and authentication  ...  The first paper, A Lightweight Secure Data Transmission Protocol for Resource Constrained Devices, presents a simple, lightweight, but robust security protocol based on the backward property of RC4 stream  ... 
doi:10.1002/sec.202 fatcat:z47aflkvgfg5paoel3rztdcdjq

Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey

Fahd A. Alhaidari, Department of Computer Information System, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia, Ebtesam J. Alqahtani
2020 Journal of Communications  
Nowadays, cloud computing and IoT devices are widely used and involved in our life.  ...  However, the current cloud computing paradigm still have some limitation mainly related to the latency, location, and mobility.  ...  Designing a lightweight security protocol for sensors networks.MD5 and AES algorithms have been used for message authentication and encryption respectively.  ... 
doi:10.12720/jcm.15.1.14-30 fatcat:azrdgncpaverpn47ly6nyw3wfy

Protocols for Secure Internet of Things

S Revathi
2017 International Journal of Education and Management Engineering  
The lightweight versions of the existing Internet protocols are backing the operations of IoT to a large extent but the security needs are not met completely as of yet.  ...  It refers to networking of simplest mundane objects not just for human to machine or human to human interactions but for independent thing to thing interaction as well.  ...  DTLS for Constrained Devices The Datagram Transport Layer Security (DTLS) is a protocol devised for security of datagram communication approach in Internet.  ... 
doi:10.5815/ijeme.2017.02.03 fatcat:cnfld3m3erbplhw3cfmdjbjp6i

Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart City

Seonghyeon Gong, Erzhena Tcydenova, Jeonghoon Jo, Younghun Lee, Jong Hyuk Park
2019 Sustainability  
Because a network of heterogeneous devices facilitates an attacker's intrusion through a specific device or node, a device management framework is required to manage each node comprehensively.  ...  The broadly configured smart city network requires a variety of security considerations for a heterogeneous device environment.  ...  Secure Device Management Protocol for Lightweight End Node The presence of lightweight devices with extremely limited resources presents a huge security risk to the entire network.  ... 
doi:10.3390/su11143889 fatcat:2ccf6qyhibgfxk6vsyehhead5q

The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities

Antonio J. Jara, Latif Ladid, Antonio Fernandez Gómez-Skarmeta
2013 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
In addition, IPv6 has been designed to provide secure communications to users and mobility for all devices attached to the user; thereby users can always be connected.  ...  Hopefully, the next generation of Internet Protocol, also known as IPv6 brings a solution.  ...  Jara in the Intelligent Systems and Networks group, of the University of Murcia, Espinardo, Spain, awarded for its excellence as a research group in the frame of the Spanish "Plan de Ciencia y Tecnología  ... 
doi:10.22667/jowua.2013.09.31.097 dblp:journals/jowua/JaraLG13 fatcat:fxp3jtjt2jg5jg577d74veahtu

Smart Home - Application using HTTP/MQTT as Communication Protocols [article]

Muneeb Ahmed, Mohd Majid Akhtar
2021 Zenodo  
RESTful API deployed on AWS EC2/Lambda is used to realize HTTP communication protocol, and MQTT is realized using AWS IoT service.  ...  This study discloses the development of a solution for realizing a smart home in the post COVID-19 era using the Internet of Things domain knowledge.  ...  Encryption + Authentication (for security on MQTT protocol) 2) Logs and Reports (for logging events) 3) Rules/Security Policies (for defining the correct behavior) 4) Performance Analysis of two communication  ... 
doi:10.5281/zenodo.5791697 fatcat:jmamvim7rramhjjjhbgtz2t2c4

Toward a Lightweight Authentication and Authorization Framework for Smart Objects

Jose L. Hernandez-Ramos, Marcin Piotr Pawlowski, Antonio J. Jara, Antonio F. Skarmeta, Latif Ladid
2015 IEEE Journal on Selected Areas in Communications  
The resulting architecture is intended to provide a holistic security approach to be leveraged in the design of novel and lightweight security protocols for IoT constrained environments.  ...  This work proposes a set of lightweight authentication and authorization mechanisms in order to support smart objects during their life cycle.  ...  , Security and Trust for the Internet of Things Networks".  ... 
doi:10.1109/jsac.2015.2393436 fatcat:zjjuso7gvjdblkawalxd44ku5q

Lightweight Physical Layer Aided Key Agreement and Authentication for the Internet of Things

Seungnam Han, Yonggu Lee, Jinho Choi, Euiseok Hwang
2021 Electronics  
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AKA) protocol in the Internet of Things (IoT).  ...  Therefore, the proposed lightweight PL-AKA has the potential for practical and efficient implementation of large-scale IoT networks.  ...  Acknowledgments: This research was supported by Institute for Information and Communications Technology Promotion (IITP) funded by the Korea Government through the Ministry of Science  ... 
doi:10.3390/electronics10141730 fatcat:3zqolyytvjeednk2scvksv35li
« Previous Showing results 1 — 15 out of 6,754 results