Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things

被引:5
|
作者
Vivek V.J. [1 ]
Senthil Murugan T. [1 ]
机构
[1] Department of Computer Science and Engineering, Vel Tech Dr. RR & Dr. SR Technical University, Chennai
来源
Vivek, V. Jog (vivek.v.jog@gmail.com) | 1600年 / Emerald Group Holdings Ltd.卷 / 10期
关键词
Authentication; DNA computing; Elliptic curve cryptography (ECC); Internet of Things (IoT); Manufacturing systems; Networked control; Profile table; Security;
D O I
10.1108/IJICC-08-2016-0030
中图分类号
学科分类号
摘要
Purpose: Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks. Design/methodology/approach: In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Findings: DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack. Originality/value: This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. © 2017, © Emerald Publishing Limited.
引用
收藏
页码:241 / 256
页数:15
相关论文
共 50 条
  • [31] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Majumder, Suman
    Ray, Sangram
    Sadhukhan, Dipanwita
    Khan, Muhammad Khurram
    Dasgupta, Mou
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1867 - 1896
  • [32] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Suman Majumder
    Sangram Ray
    Dipanwita Sadhukhan
    Muhammad Khurram Khan
    Mou Dasgupta
    Wireless Personal Communications, 2021, 116 : 1867 - 1896
  • [33] Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
    Hu, Shunfang
    Zhang, Yuanyuan
    Guo, Yanru
    Chen, Yanru
    Chen, Liangyin
    SENSORS, 2025, 25 (03)
  • [34] Efficient Reduction of the Transmission Delay of the Authentication Based Elliptic Curve Cryptography in 6LoWPAN Wireless Sensor Networks in the Internet of Things
    Bettoumi, Balkis
    Bouallegue, Ridha
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 1471 - 1476
  • [35] Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
    Kobra Mabodi
    Mehdi Yusefi
    Shahram Zandiyan
    Leili Irankhah
    Reza Fotohi
    The Journal of Supercomputing, 2020, 76 : 7081 - 7106
  • [36] Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
    Mabodi, Kobra
    Yusefi, Mehdi
    Zandiyan, Shahram
    Irankhah, Leili
    Fotohi, Reza
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (09): : 7081 - 7106
  • [37] Implementation Of An Efficient Security Scheme Through Elliptic Curve Cryptography Based Radio-Frequency Identification(RFID) In Context Of Internet Of Things
    Chakraborty, Moumita
    Jana, Bappaditya
    Mandal, Tamoghna
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1777 - 1781
  • [38] An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
    Sen, Nilanjan
    APPLIED ALGORITHMS, 2014, 8321 : 110 - 121
  • [39] Research on Authentication Protocol of RFID Based on Multi-Level Security Policy
    Su, Qing
    Li, Yong-zhen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2014), 2015, : 128 - 131
  • [40] Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography
    Jyothi K.K.
    Chaudhari S.
    International Journal of Cloud Computing, 2020, 9 (2-3) : 258 - 284