The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

by   Tran Khanh Dang, et al.

Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous articles only focused on the Central Authority (CA) since this leads to an increase in the computation cost and energy consumption for the specific cases on the Internet of Things (IoT). Hence, in this article, we will lessen the importance of these third parties through proposing an enhanced authentication mechanism that includes key management and evaluation based on the past interactions to assist the objects joining a secured area without any nearby CA. We refer to a mobility dataset from CRAWDAD collected at the University Politehnica of Bucharest and rebuild into a new random dataset larger than the old one. The new one is an input for a simulated authenticating algorithm to observe the communication cost and resource usage of devices. Our proposal helps the authenticating flexible, being strict with unknown devices into the secured zone. The threshold of maximum friends can modify based on the optimization of the symmetric-key algorithm to diminish communication costs (our experimental results compare to previous schemes less than 2000 bits) and raise flexibility in resource-constrained environments.



There are no comments yet.


page 1

page 2

page 3

page 4


A Flexible and Lightweight Group Authentication Scheme

Internet of Things (IoT) networks are becoming a part of our daily lives...

A Light-Weight Authentication Scheme for Air Force Internet of Things

Internet of Things (IoT) is ubiquitous because of its broad applications...

Secure, Anonymity-Preserving and Lightweight Mutual Authentication and Key Agreement Protocol for Home Automation IoT Networks

Home automation Internet of Things (IoT) systems have recently become a ...

Authentication and Hand-Over Algorithms for IoT Group

Current advancements in mobility of devices and also Internet of Things ...

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Existing authentication solutions proposed for Internet of Things (IoT) ...

Performance Evaluation of Multiparty Authentication in 5G IIoT Environments

With the rapid development of various emerging technologies such as the ...

Perils of Zero-Interaction Security in the Internet of Things

The Internet of Things (IoT) demands authentication systems which can pr...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.