SUACC-IoT: secure unified authentication and access control system based on capability for IoT

نویسندگان

چکیده

Abstract With the widespread use of Internet Things (IoT) in various applications and several security vulnerabilities reported them, requirements have become an integral part IoT system. Authentication access control are two principal for ensuring authorized restricted accesses to limited essential resources IoT. The built-in authentication mechanism devices is not reliable, because revealed firmware implementation protocols On other hand, current approaches that vulnerable some attacks prevalent Moreover, recent limitations context-awareness, scalability, interoperability, security. To mitigate these limitations, there a need robust system safeguard rapidly growing number devices. Consequently, this paper, we propose new secure unified IoT, called SUACC-IoT. proposed based around notion capability, where capability considered as token containing rights entities network. In system, used ensure controlled uses only lightweight Elliptic Curve Diffie-Hellman Ephemeral (ECDHE), symmetric key encryption/decryption, message code cryptographic hash primitives. SUACC-IoT proved be against probabilistic polynomial-time adversaries experimental results demonstrate protocol’s maximum CPU usage 29.35%, memory 2.79% computational overhead 744.5 ms which quite acceptable. Additionally, SUACC-IoT, reasonable communication cost 872 bits incurred longest exchanged.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traffic congestion control using Smartphone sensors based on IoT Technology

Traffic congestion in road networks is one of the main issues to be addressed, also vehicle traffic congestion and monitoring has become one of the critical issues in road transport. With the help of Intelligent Transportation System (ITS), current information of traffic can be used by control room to improve the traffic efficiency. The suggested system utilize technologies for real-time collect...

متن کامل

HCAP: A History-Based Capability System for IoT Devices

Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constraints shall be imposed on permission usage so as to realize the Principle of Least Privilege. Since IoT devices are physically embedded, they are often accessed in a particular sequen...

متن کامل

Home appliances energy management based on the IoT system

The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cuttingedge period of innovation than at any other time. From little family unit gadgets to extensive modernmachines, the vision of IoT has made it conceivable to interface the gadgets with the physical worldaround them. This expanding prominence has likewise made the IoT gadgets and ap...

متن کامل

SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways

In this paper, a secure and efficient authentication and authorization architecture for IoT-based healthcare is developed. Security and privacy of patients’ medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. Secure authentication and authorization of a remote healthcare professional is the main focus of this work. Due to resource constraints of medical sensors,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cluster Computing

سال: 2022

ISSN: ['1386-7857', '1573-7543']

DOI: https://doi.org/10.1007/s10586-022-03733-w