Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things

被引:5
|
作者
Vivek V.J. [1 ]
Senthil Murugan T. [1 ]
机构
[1] Department of Computer Science and Engineering, Vel Tech Dr. RR & Dr. SR Technical University, Chennai
来源
Vivek, V. Jog (vivek.v.jog@gmail.com) | 1600年 / Emerald Group Holdings Ltd.卷 / 10期
关键词
Authentication; DNA computing; Elliptic curve cryptography (ECC); Internet of Things (IoT); Manufacturing systems; Networked control; Profile table; Security;
D O I
10.1108/IJICC-08-2016-0030
中图分类号
学科分类号
摘要
Purpose: Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks. Design/methodology/approach: In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Findings: DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack. Originality/value: This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. © 2017, © Emerald Publishing Limited.
引用
收藏
页码:241 / 256
页数:15
相关论文
共 50 条
  • [41] Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
    Sarra Cherbal
    Abdelhak Zier
    Sara Hebal
    Lemia Louail
    Boubakeur Annane
    The Journal of Supercomputing, 2024, 80 : 3738 - 3816
  • [42] Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
    Cherbal, Sarra
    Zier, Abdelhak
    Hebal, Sara
    Louail, Lemia
    Annane, Boubakeur
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (03): : 3738 - 3816
  • [43] Multi-user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
    Kasyoka, Philemon
    Kimwele, Michael
    Angolo, Shem Mbandu
    ENGINEERING REPORTS, 2020, 2 (07)
  • [44] A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography
    Jeong, Yoon-Su
    Kim, Yong-Tae
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (03): : 137 - 142
  • [45] An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment
    Davood Noori
    Hassan Shakeri
    Masood Niazi Torshiz
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [46] An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment
    Noori, Davood
    Shakeri, Hassan
    Torshiz, Masood Niazi
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [47] Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
    Opinder Singh
    Jatinder Singh
    Ravinder Singh
    Cluster Computing, 2018, 21 : 51 - 63
  • [48] Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET
    Singh, Opinder
    Singh, Jatinder
    Singh, Ravinder
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 51 - 63
  • [49] LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things
    Bettoumi, Balkis
    Bouallegue, Ridha
    SENSORS, 2021, 21 (21)
  • [50] Multi-level host-based intrusion detection system for Internet of things
    Robin Gassais
    Naser Ezzati-Jivan
    Jose M. Fernandez
    Daniel Aloise
    Michel R. Dagenais
    Journal of Cloud Computing, 9