ECC based inter-device authentication and authorization scheme using MQTT for IoT networks

被引:49
|
作者
Lohachab, Ankur [1 ]
Karambir [1 ]
机构
[1] Univ Inst Engn & Technol, Dept Comp Sci & Engn, Kurukshetra 136119, Haryana, India
关键词
Iot; Authentication; Authorization; ECC; MQTT; Cloud; Fog; CHALLENGES; PROTOCOL;
D O I
10.1016/j.jisa.2019.02.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has emerged from the proliferation of smart and inter-connected devices ranging from tiny sensors to complex Fog and Cloud nodes, various networking technologies, and communication protocols. These IoT devices permeate in our lives through various applications including smart homes, healthcare, defence, transportation, and so forth. Although IoT provides a way of interaction among the physical world objects and the Internet, these connected devices have created a new dimension of security challenges associated with the vulnerabilities present in them. These challenges can be tackled to some extent by deploying a rigid authentication and access control model. In this paper, we propose a novel light-weight authentication and authorization framework suitable for distributed IoT environment using Elliptical Curve Cryptography (ECC) and Message Queuing Telemetry Transport (MQTT). Moreover, we implement the scheme, and analyse and compare its various security and performance aspects with other schemes. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [31] A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2019, 11 (02) : 149 - 164
  • [32] A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Lee, Youngsook
    Won, Dongho
    [J]. SENSORS, 2014, 14 (11): : 21023 - 21044
  • [33] Blockchain-based identity and authentication scheme for MQTT protocol
    Abubakar, Mwrwan Abdelrazig
    Jaroucheh, Zakwan
    Al-Dubai, Ahmed
    Liu, Xiaodong
    [J]. 2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 73 - 81
  • [34] A provably secure ECC-based roaming authentication scheme for global mobility networks
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Kumari, Saru
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54 (54)
  • [35] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT
    Zou, Shihong
    Cao, Qiang
    Wang, Chenyu
    Huang, Zifu
    Xu, Guoai
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
  • [36] RAKI:A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT
    Zhou, Yousheng
    Li, Lunhao
    Obaidat, Mohammad S.
    Liu, Yuanni
    Vijayakumar, P.
    Hsiao, Kuei-Fang
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1175 - 1180
  • [37] Proximity Based IoT Device Authentication
    Zhang, Jiansong
    Wang, Zeyu
    Yang, Zhice
    Zhang, Qian
    [J]. IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [38] DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol
    Alatram, Alaa
    Sikos, Leslie F.
    Johnstone, Mike
    Szewczyk, Patryk
    Kang, James Jin
    [J]. COMPUTER NETWORKS, 2023, 231
  • [39] Lightweight, ECC based RFID Authentication Scheme for WLAN
    Kumar, Amit
    Om, Hari
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 89 - 103
  • [40] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270