A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

نویسندگان

چکیده

IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in Internet of Things (IoTs). 6LoWPAN allows with limited battery power and storage capacity carry datagrams lossy error-prone radio links offered by IEEE 802.15.4 standard, thus acting as an adoption layer between protocol network. The data link is based on AES (Advanced Encryption Standard), but standard lacks has omitted security privacy requirements at higher layers. sensor can join network without requiring authentication procedure. Therefore, from perspectives, vulnerable many attacks such replay attack, Man-in-the-Middle Impersonation Modification attack. This paper proposes a secure efficient cluster-based scheme (CBAS) for 6LoWPAN. In this approach, are organized into cluster communicate central through dedicated node. main objective CBAS provide authentic communication among nodes. To ensure low signaling overhead during registration, authentication, handover procedures, we also introduce lightweight de-registration, initial when node or group leave cluster. Our analysis shows that proposed approach protects against various attacks, including Identity Confidentiality Replay Man-in-the-middle simulation experiments show reduced registration delay 11%, handoff 32%, cost 37% compared SGMS (Secure Group Mobility Scheme) LAMS (Light-Wight Authentication & Scheme).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Directed Path Based Authentication Scheme for the Internet of Things

The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the direct...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

Secure Multicast with Source Authentication for the Internet of Things

English) The Internet of Things is a rapidly evolving eld of high-end technology and research. Its security is vital to the reliability and safety of the future everyday communications. The DTLS protocol is a default protocol to assure security for unicast communication. A DTLS record layer extension for multicast in constrained environments is being designed to assure security for multicast. H...

متن کامل

Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2022

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2022.018589