Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things

被引:5
|
作者
Vivek V.J. [1 ]
Senthil Murugan T. [1 ]
机构
[1] Department of Computer Science and Engineering, Vel Tech Dr. RR & Dr. SR Technical University, Chennai
来源
Vivek, V. Jog (vivek.v.jog@gmail.com) | 1600年 / Emerald Group Holdings Ltd.卷 / 10期
关键词
Authentication; DNA computing; Elliptic curve cryptography (ECC); Internet of Things (IoT); Manufacturing systems; Networked control; Profile table; Security;
D O I
10.1108/IJICC-08-2016-0030
中图分类号
学科分类号
摘要
Purpose: Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks. Design/methodology/approach: In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Findings: DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack. Originality/value: This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. © 2017, © Emerald Publishing Limited.
引用
收藏
页码:241 / 256
页数:15
相关论文
共 50 条
  • [21] Elliptic Curve Cryptography based Security Framework for Internet of Things (IoT) Enabled Smart Card
    Bai, T. Daisy Premila
    Raj, K. Michael
    Rabara, S. Albert
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 43 - 46
  • [22] Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
    Zhao, Xingwen
    Li, Dexin
    Li, Hui
    SENSORS, 2022, 22 (19)
  • [23] BSD-based Elliptic Curve Cryptography for the Open Internet of Things
    Pinol, Oriol Pinol
    Raza, Shahid
    Eriksson, Joakim
    Voigt, Thiemo
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [24] Toward A Real-Time Elliptic Curve Cryptography-Based Facial Security System
    Tuy Tan Nguyen
    Lee, Hanho
    2022 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2022, : 364 - 367
  • [25] A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card
    Madhusudhan, R.
    Hegde, Manjunath
    Memon, Imran
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (11)
  • [26] A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [27] A security enhanced password authentication and update scheme based on elliptic curve cryptography
    Qiao, Pengshuai
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (02) : 130 - 139
  • [28] Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data
    Yeh, Hsiu-Lien
    Chen, Tien-Ho
    Hu, Kuei-Jung
    Shih, Wei-Kuan
    IET INFORMATION SECURITY, 2013, 7 (03) : 247 - 252
  • [29] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [30] Optimized video internet of things using elliptic curve cryptography based encryption and decryption
    Alhayani, Bilal S. A.
    Hamid, Nagham
    Almukhtar, Firas Husham
    Alkawak, Omar A.
    Mahajan, Hemant B.
    Kwekha-Rashid, Ameer Sardar
    Ilhan, Haci
    Marhoon, Haydar Abdulameer
    Mohammed, Husam Jasim
    Chaloob, Ibrahim Zeghaiton
    Alkhayyat, Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101