Hash-MAC-DSDV: Mutual Authentication for Intelligent IoT-Based Cyber–Physical Systems

نویسندگان

چکیده

Cyber–physical systems (CPS) connected in the form of Internet Things (IoT) are vulnerable to various security threats, due infrastructure-less deployment IoT devices. Device-to-Device (D2D) authentication these networks ensures integrity, authenticity, and confidentiality information deployed area. The literature suggests different approaches address issues CPS technologies. However, they mostly based on centralized techniques or specific system deployments with a higher cost computation communication. It is therefore necessary develop an effective scheme that can resolve problems technologies In this article, lightweight hash media access control destination sequence distance vector (Hash-MAC-DSDV) routing proposed technologies, networks. For purpose, devices (multi-WSNs) developed from local chain public chain, respectively. D2D by Hash-MAC-DSDV mutual scheme, where MAC addresses individual registered first phase advertised network second phase. allows legitimate modify their table unicast one-way mechanism transfer captured data source toward destination. Our evaluation results demonstrate outweighs existing schemes terms attack detection, energy consumption, communication metrics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems

In the last decade RFID technology has become widespread. It can be found in various fields of our daily life. Due to the rapid development more and more security problems were raised. Since tags have limited memory and very low computational capacity a so-called lightweight authentication is needed. Several protocols have been proposed to resolve security and privacy issues in RFID systems. Ho...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

An Efficient Improvement on Safkhani et al.’s Hash-Based Mutual Authentication Protocol for RFID Systems

Nowadays, plenty of radio frequency identification (RFID) systems have been proposed and used in the real world for convenience. An RFID system requires advanced properties of confidentiality, indistinguishability, forward security and mutual authentication to provide a higher security level. Safkhani et al. proposed a hash-based authentication protocol for RFID systems. Though their protocol p...

متن کامل

Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems

Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and desynchronization attacks. In this paper we cryptanalysis a hash based RFID mutual authentication protocol which has been recently proposed by Cho et al. More precisely, w...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2022

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2021.3083731