Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things

被引:5
|
作者
Vivek V.J. [1 ]
Senthil Murugan T. [1 ]
机构
[1] Department of Computer Science and Engineering, Vel Tech Dr. RR & Dr. SR Technical University, Chennai
来源
Vivek, V. Jog (vivek.v.jog@gmail.com) | 1600年 / Emerald Group Holdings Ltd.卷 / 10期
关键词
Authentication; DNA computing; Elliptic curve cryptography (ECC); Internet of Things (IoT); Manufacturing systems; Networked control; Profile table; Security;
D O I
10.1108/IJICC-08-2016-0030
中图分类号
学科分类号
摘要
Purpose: Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks. Design/methodology/approach: In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Findings: DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack. Originality/value: This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. © 2017, © Emerald Publishing Limited.
引用
收藏
页码:241 / 256
页数:15
相关论文
共 50 条
  • [11] A Design of Elliptic Curve Cryptography-based Authentication using QR Code
    Thiranant, Non
    Kang, Young-Jin
    Kim, Taeyong
    Jang, WonTae
    Park, Suhyun
    Lee, HoonJae
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 614 - 619
  • [12] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Hung-Yu Chien
    Wireless Personal Communications, 2017, 94 : 2925 - 2936
  • [13] Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (07): : 618 - 624
  • [14] An Elliptic Curve Cryptography-Based Multi-Server Authentication Scheme Using Cancelable Biometrics
    Barman, Subhas
    Chaudhuri, Abhisek
    Chatterjee, Atanu
    Raza, Md Ramiz
    INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 : 153 - 163
  • [15] An Offline Direct Authentication Scheme for the Internet of Medical Things Based on Elliptic Curve Cryptography
    Maarouf, Asmaa
    Sakr, Rasha
    Elmougy, Samir
    IEEE ACCESS, 2024, 12 : 134902 - 134925
  • [16] Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment
    Zhai, Haonan
    Deng, Miaolei
    Wu, Huanmei
    SYMMETRY-BASEL, 2024, 16 (07):
  • [17] Threshold Cryptography-based Group Authentication (TCGA) Scheme for the Internet of Things (IoT)
    Mahalle, Parikshit N.
    Prasad, Neeli Rashmi
    Prasad, Ramjee
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [18] A secure lightweight anonymous elliptic curve cryptography-based authentication and key agreement scheme for fog assisted-Internet of Things enabled networks
    Verma, Upendra
    Bhardwaj, Diwakar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [19] An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System
    Lee, Chin-I
    Chien, Hung-Yu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [20] Performance Comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication
    Thiranant, Non
    Lee, Young Sil
    Lee, HoonJae
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 278 - 282