Two Phase Authentication and VPN Based Secured Communication for IoT Home Networks

10/30/2019
by   Md. Masuduzzaman, et al.
0

With the advancement of technology, devices, which are considered non-traditional in terms of internet capabilities, are now being embedded in microprocessors to communicate and these devices are known as IoT devices. This technology has enabled household devices to have the ability to communicate with the internet and a network comprising of such device can create a home IoT network. Such IoT devices are resource constrained and lack high-level security protocols. Thus, security becomes a major issue for such network systems. One way to secure the networks is through reliable authentication protocols and data transfer mechanism. As the household devices are controllable by the users remotely, they are accessed over the internet. Therefore, there should also be a method to make the communication over the internet between IoT devices and the users more secured. This paper proposes a two-phase authentication protocol for authentication purposes and a VPN based secure channel creation for the communication of the devices in the network. Furthermore, the paper discusses the Elliptic Curve Cryptography as a viable alternative to RSA for a more efficient Key exchange mechanism for low-powered IoT devices in the network.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/04/2020

Public-Key Based Authentication Architecture for IoT Devices Using PUF

Nowadays, Internet of Things (IoT) is a trending topic in the computing ...
research
10/28/2022

LAKEE: A Lightweight Authenticated Key Exchange Protocol for Power Constrained Devices

The rapid development of IoT networks has led to a research trend in des...
research
11/01/2019

NFV-based IoT Security for Home Networks using MUD

A new scalable ISP level system architecture to secure and protect all I...
research
08/17/2023

Architecture and Applications of IoT Devices in Socially Relevant Fields

Number of IoT enabled devices are being tried and introduced every year ...
research
07/18/2022

Performance Evaluation for Privacy-preserving Control of Domestic IoT Devices

Most of the existing models for deploying IoT ecosystem involves the ven...
research
07/06/2022

LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm

The widespread expansion of the IoT based services are changing peoples ...
research
10/31/2019

MQTT-ST: a Spanning Tree Protocol for Distributed MQTT Brokers

MQTT, one of the most popular protocols for the IoT, works according to ...

Please sign up or login with your details

Forgot password? Click here to reset