LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm

07/06/2022
by   Chintan Patel, et al.
0

The widespread expansion of the IoT based services are changing peoples living habits. With the vast data generation and intelligent decision support system, an IoT is supporting many industries to improve their products and services. The major challenge for IoT developers is to design a secure data transmission system and a trustworthy inter device and user device communication system. The data starts its journey from the sensing devices and reaches the user dashboard through a different medium. Authentication between two IoT devices provides a reliable and lightweight key generation system. In this paper, we put forward a novel authentication approach for the IoT paradigm. We postulate an ECC based two factor Level Dependent Authentication for Generic IoT (LDA 2IoT) in which users at a particular level in the hierarchy can access the sensors deployed at below or the equal level of the hierarchy. We impart the security analysis for the proposed LDA 2IoT based on the Dolev Yao channel and widely accepted random oracle based ROR model. We provide the implementation of the proposed scheme using the MQTT protocol. Finally, we set forth a performance analysis for the proposed LDA 2IoT system by comparing it with the other existing scheme.

READ FULL TEXT
research
07/27/2022

EBAKE-SE: A Novel ECC Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element

Industrial IoT (IIoT) aims to enhance services provided by various indus...
research
10/30/2019

Two Phase Authentication and VPN Based Secured Communication for IoT Home Networks

With the advancement of technology, devices, which are considered non-tr...
research
03/01/2023

Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices

Physical-layer authentication is a popular alternative to the convention...
research
05/20/2021

Secure, Anonymity-Preserving and Lightweight Mutual Authentication and Key Agreement Protocol for Home Automation IoT Networks

Home automation Internet of Things (IoT) systems have recently become a ...
research
08/06/2022

Analysis of lightweight cryptographic solutions for authentication in IoT

Currently, special attention is being paid to scenarios where the interc...
research
11/12/2020

A Fast and Scalable Authentication Scheme in IoT for Smart Living

Numerous resource-limited smart objects (SOs) such as sensors and actuat...
research
04/26/2020

Performance Analysis of the Hybrid IoT Security Model of MQTT and UMA

IoT applications are promising for future daily activities; therefore, t...

Please sign up or login with your details

Forgot password? Click here to reset