Energy efficient distributed lightweight authentication and encryption technique for IoT security

被引:12
|
作者
Sudhakaran, Pradeep [1 ]
Malathy, C. [1 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Kattankulathur 603203, India
关键词
authentication; cipher block chaining; IoT security; symmetric algorithms; trust estimation;
D O I
10.1002/dac.4198
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) is an intelligent technology and service that mutually communicates information between human and devices or between Internet-based devices. In IoT security, the authentication should be distributed and lightweight. Token generation should be based on the trust worthiness of the devices, and it needs to ensure fast authentication and authorization. In this paper, we propose an Energy Efficient Distributed Lightweight Authentication and Encryption (EEDLAE) technique for IoT security. In our proposed technique, the receiver generates the token for each sender. The token expiration time is determined based on the trust value of each sender, and sleep period of the receiver radio is determined based on its remaining energy. For encryption, Counter with Cipher Block Chaining-Message Authentication Code (CCM) is applied. Experimental results show that EEDLAE technique can hold out against affected packets, higher resilience against node capture, increased throughput, and residual energy, compared with the existing technique.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
    Youssef, Wajih El Hadj
    Abdelli, Ali
    Dridi, Fethi
    Brahim, Rim
    Machhout, Mohsen
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [42] An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy
    Mohanty, Sachi Nandan
    Ramya, K. C.
    Rani, S. Sheeba
    Gupta, Deepak
    Shankar, K.
    Lakshmanaprabu, S. K.
    Khanna, Ashish
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 (102): : 1027 - 1037
  • [43] Efficient identity authentication and encryption technique for high throughput RFID system
    Hsu, Ching-Hsien
    Wang, Shangguang
    Zhang, Daqiang
    Chu, Hai-Cheng
    Lu, Ning
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2581 - 2591
  • [44] Enhanced ubiquitous system architecture for securing healthcare IoT using efficient authentication and encryption
    Kulkarni, Chaitanya Shrikant
    Naniwadekar, Makarand Y.
    Mirzaxmatovna, Yuldasheva Minavar
    Athawale, Shashikant V.
    Bhadla, Mohit
    Byeon, Haewon
    INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS, 2024,
  • [45] Encryption Standards for security system in Energy Harvesting for IoT requirements - Review
    Arun, V.
    Reddy, D. Laxma
    Srinivas, S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 1224 - 1227
  • [46] An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    IEEE ACCESS, 2019, 7 : 184207 - 184220
  • [47] Security of lightweight mutual authentication protocols
    Yu-Ju Tu
    Gaurav Kapoor
    Selwyn Piramuthu
    The Journal of Supercomputing, 2021, 77 : 4565 - 4581
  • [48] A Lightweight Authentication Mechanism between IoT Devices
    Han, Jin-Hee
    Kim, JeongNyeo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1153 - 1155
  • [49] Security of lightweight mutual authentication protocols
    Tu, Yu-Ju
    Kapoor, Gaurav
    Piramuthu, Selwyn
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4565 - 4581
  • [50] Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices
    Jarosz, Michal
    Wrona, Konrad
    Zielinski, Zbigniew
    PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 617 - 625