The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

03/24/2019
by   Tran Khanh Dang, et al.
0

Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous articles only focused on the Central Authority (CA) since this leads to an increase in the computation cost and energy consumption for the specific cases on the Internet of Things (IoT). Hence, in this article, we will lessen the importance of these third parties through proposing an enhanced authentication mechanism that includes key management and evaluation based on the past interactions to assist the objects joining a secured area without any nearby CA. We refer to a mobility dataset from CRAWDAD collected at the University Politehnica of Bucharest and rebuild into a new random dataset larger than the old one. The new one is an input for a simulated authenticating algorithm to observe the communication cost and resource usage of devices. Our proposal helps the authenticating flexible, being strict with unknown devices into the secured zone. The threshold of maximum friends can modify based on the optimization of the symmetric-key algorithm to diminish communication costs (our experimental results compare to previous schemes less than 2000 bits) and raise flexibility in resource-constrained environments.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/13/2019

A Flexible and Lightweight Group Authentication Scheme

Internet of Things (IoT) networks are becoming a part of our daily lives...
research
02/08/2019

A Light-Weight Authentication Scheme for Air Force Internet of Things

Internet of Things (IoT) is ubiquitous because of its broad applications...
research
05/20/2021

Secure, Anonymity-Preserving and Lightweight Mutual Authentication and Key Agreement Protocol for Home Automation IoT Networks

Home automation Internet of Things (IoT) systems have recently become a ...
research
01/18/2022

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Existing authentication solutions proposed for Internet of Things (IoT) ...
research
01/16/2020

Performance Evaluation of Multiparty Authentication in 5G IIoT Environments

With the rapid development of various emerging technologies such as the ...
research
07/28/2019

Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement?

Security provisioning has become the most important design consideration...
research
01/22/2019

Perils of Zero-Interaction Security in the Internet of Things

The Internet of Things (IoT) demands authentication systems which can pr...

Please sign up or login with your details

Forgot password? Click here to reset