Secure ticket-based authentication method for IoT applications

被引:2
|
作者
Alizadeh, Mojtaba [1 ]
Tadayon, Mohammad Hesam [2 ]
Jolfaei, Alireza [3 ]
机构
[1] Lorestan Univ, Comp Engn Dept, Khorramabad, Iran
[2] Iran Telecommun Res Ctr ITRC, Tehran, Iran
[3] Macquarie Univ, Dept Comp, Sydney, Australia
关键词
Internet of things; Authentication; Privacy; Security; INTERNET; PRIVACY; CHALLENGES; PROTOCOL; BELLARE; THINGS;
D O I
10.1016/j.dcan.2021.11.003
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The recent surge in the number of machines, appliances, and services connected to the Internet demands secure processing and transmission of sensory data. Authentication plays a crucial role in a typical security model used in the Internet of Things (IoT), and it protects data communications from various attacks, such as impersonation and denial of service, by verifying and allowing legitimate users to access the IoT resources. However, recent authentication literature has not addressed the need for developing a scalable and efficient authentication method in this field. This paper proposes a secure and anonymous ticket-based authentication method for the IoT. The proposed method protects the network from various security and privacy threats such as data alternation and denial of service while also offering mutual authentication and sensor anonymity. Our security and performance evaluations confirm the improvement.
引用
收藏
页码:710 / 716
页数:7
相关论文
共 50 条
  • [21] A Security Mechanism Against the RSU Compromise Attack in a Ticket-Based Authentication Scheme for VANETs
    Chikhaoui, Ons
    Abassi, Ryma
    Douss, Aida Ben Chehida
    El Fatmi, Sihem Guemara
    INFORMATION SYSTEMS, EMCIS 2019, 2020, 381 : 403 - 416
  • [22] The enhanced ticket-based routing algorithm
    Xiao, L
    Wang, J
    Nahrstedt, K
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 2222 - 2226
  • [23] Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
    Pippal, Ravi Singh
    Jaidhar, C. D.
    Tapaswi, Shashikala
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2013, 37 (02): : 149 - 156
  • [24] A Ticket-based Re-authentication Scheme for Fast Handover in Wireless Local Area Networks
    Li, Guangsong
    Chen, Xi
    Ma, Jianfeng
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [25] Comments and Improvements of "HOTA: Handover Optimized Ticket-Based Authentication in Network-Based Mobility Management"
    Alizadeh, Mojtaba
    Tadayon, Mohammad Hessam
    Sakurai, Kouichi
    Baharun, Sabariah
    Anada, Hiroaki
    Zamani, Mazdak
    Zeki, Akram
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Khurram
    PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 112 - 116
  • [26] TARP: Ticket-based Address Resolution Protocol
    Lootah, W
    Enck, W
    McDaniel, P
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 95 - 103
  • [27] A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications
    Almulhim, Maria
    Islam, Nazurl
    Zaman, Noor
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (01): : 107 - 120
  • [28] STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks
    KrauB, Christoph
    Schneider, Markus
    Bayarou, Kpatcha
    Eckert, Claudia
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 310 - +
  • [29] TARP: Ticket-based address resolution protocol
    Lootah, Wesam
    Enck, William
    McDaniel, Patrick
    COMPUTER NETWORKS, 2007, 51 (15) : 4322 - 4337
  • [30] A global ticket-based access scheme for mobile users
    Wang, H
    Zhang, YC
    Cao, JL
    Kambayahsi, Y
    INFORMATION SYSTEMS FRONTIERS, 2004, 6 (01) : 35 - 46