An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things

被引:0
|
作者
Sunggyun Jang
Ducsun Lim
Jinyeong Kang
Inwhee Joe
机构
[1] Hanyang University,Department of Electronics and Computer Engineering
来源
关键词
Merkle Tree; Root Hash; MAC (Message Authentication Code); IoT (Internet of Things) security; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless network devices are used for the Internet of Things in a variety of applications, and although the IoT has many benefits, there are some security issues in this area. Hacking tools that are widely used in wireless communication enable the attacker to export the information stored in the device memory. Devices within the IoT should not allow this information to be accessed without an authentication. In this paper, we propose an efficient device authentication protocol without certification authority for the Internet of Things. Compared to the existing Constrained Application Protocol, the proposed protocol increases efficiency by minimizing the number of message exchanges. Since our protocol is based on a keyed hash algorithm, the Certificate of Authority is not required. Experimental results show that the proposed authentication protocol improves the security level and reduces the resource consumption of devices.
引用
收藏
页码:1681 / 1695
页数:14
相关论文
共 50 条
  • [1] An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things
    Jang, Sunggyun
    Lim, Ducsun
    Kang, Jinyeong
    Joe, Inwhee
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (04) : 1681 - 1695
  • [2] Energy-Efficient Device-Based Node Authentication Protocol for the Internet of Things
    Lin, Shih-Chang
    Wen, Chih-Yu
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 149 - 150
  • [3] A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things
    Badhib, Arwa
    Alshehri, Suhair
    Cherif, Asma
    IEEE ACCESS, 2021, 9 : 124768 - 124792
  • [4] A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
    Li, Xiong
    Peng, Jieyao
    Niu, Jianwei
    Wu, Fan
    Liao, Junguo
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 1606 - 1615
  • [5] A Secure and Efficient Mutual Authentication Hand-off Protocol for Sensor Device Support in Internet of Things
    Ndibanje, Bruce
    Kim, KiHwan
    Kang, YoungJin
    Kim, HyunHo
    Kim, TaeYong
    Lee, HoonJae
    SENSORS AND MATERIALS, 2017, 29 (07) : 953 - 960
  • [6] A Lightweight Authentication Protocol for Internet of Things
    Lee, Jun-Ya
    Lin, Wei-Cheng
    Huang, Yu-Hung
    2014 INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS (ISNE), 2014,
  • [7] An Authentication Protocol for the Medical Internet of Things
    El-Meniawy, Nagwa
    Rizk, Mohamed R. M.
    Ahmed, Magdy A.
    Saleh, Mohamed
    SYMMETRY-BASEL, 2022, 14 (07):
  • [8] Authentication Protocol for Securing Internet of Things
    Maarof, Ahmed
    Senhadji, Mohamed
    Labbi, Zouheir
    Belkasmi, Mostafa
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [9] Randomly shifted certification authority authentication protocol for MANETs
    Safdar, G. A.
    McLoone, M.
    2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3, 2007, : 841 - 845
  • [10] Efficient Multicast Authentication in Internet of Things
    Bamasag, Omaimah
    Toumi, Kamal Youcef
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 429 - 435