Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment

Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various security requirements authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure this paper implements an IoT devices authentication scheme based on something that is in the IoT devices environment (i.e. ambient access points). Data from the broadcast messages (i.e. beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/04/2020

Efficient and Secure Data Transmission Approach in Cloud-MANET-IoT Integrated Framework

The Internet of Things (IoT) devices have capabilities to interact and c...
research
02/08/2019

A Light-Weight Authentication Scheme for Air Force Internet of Things

Internet of Things (IoT) is ubiquitous because of its broad applications...
research
08/11/2022

Secure ambient intelligence prototype for airports

Nowadays, many technological advances applied to the Internet of Things ...
research
01/18/2022

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Existing authentication solutions proposed for Internet of Things (IoT) ...
research
04/05/2022

BeeTS: Smart Distributed Sensor Tuple Spaces combined with Agents using Bluetooth and IP Broadcasting

Most Internet-of-Things (IoT) devices and smart sensors are connected vi...
research
09/26/2022

Preprint: Privacy-preserving IoT Data Sharing Scheme

Data sharing can be granted using different factors one of which is some...
research
01/21/2019

Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

The unprecedented proliferation of smart devices together with novel com...

Please sign up or login with your details

Forgot password? Click here to reset