An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things

被引:0
|
作者
Sunggyun Jang
Ducsun Lim
Jinyeong Kang
Inwhee Joe
机构
[1] Hanyang University,Department of Electronics and Computer Engineering
来源
关键词
Merkle Tree; Root Hash; MAC (Message Authentication Code); IoT (Internet of Things) security; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless network devices are used for the Internet of Things in a variety of applications, and although the IoT has many benefits, there are some security issues in this area. Hacking tools that are widely used in wireless communication enable the attacker to export the information stored in the device memory. Devices within the IoT should not allow this information to be accessed without an authentication. In this paper, we propose an efficient device authentication protocol without certification authority for the Internet of Things. Compared to the existing Constrained Application Protocol, the proposed protocol increases efficiency by minimizing the number of message exchanges. Since our protocol is based on a keyed hash algorithm, the Certificate of Authority is not required. Experimental results show that the proposed authentication protocol improves the security level and reduces the resource consumption of devices.
引用
收藏
页码:1681 / 1695
页数:14
相关论文
共 50 条
  • [31] Performance Analysis of Novel Randomly Shifted Certification Authority Authentication Protocol for MANETs
    G. A. Safdar
    M. P. O'Neill (nee McLoone)
    EURASIP Journal on Wireless Communications and Networking, 2009
  • [32] A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
    Hasan, Mohammad Kamrul
    Zhou, Weichen
    Safie, Nurhizam
    Ahmed, Fatima Rayan Awad
    Ghazal, Taher M.
    IEEE ACCESS, 2024, 12 : 61642 - 61666
  • [33] QR Code Based Mutual Authentication Protocol for Internet of Things
    Marktscheffel, Tobias
    Gottschlich, Wolfram
    Popp, Wolfgang
    Werli, Philemon
    Fink, Simon Dominik
    Bilzhause, Arne
    de Meer, Hermann
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,
  • [34] PAKIT: Proactive Authentication and Key Agreement Protocol for Internet of Things
    Aghili, Seyed Farhad
    Mala, Hamid
    Shojafar, Mohammad
    Conti, Mauro
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 348 - 353
  • [35] An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things
    Zhao, Yue
    Yang, Bin
    Yang, Yarang
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 73 - 79
  • [36] An Improved Authentication Protocol Using Smart Cards for the Internet of Things
    Cao Shouqi
    Liu Wanrong
    Cao Liling
    He Xin
    Ji Zhiyong
    IEEE ACCESS, 2019, 7 : 157284 - 157292
  • [37] A New Lightweight Authentication and Key agreement Protocol For Internet of Things
    Arasteh, Sima
    Aghili, Seyed Farhad
    Mala, Hamid
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 52 - 59
  • [38] Multilevel authentication protocol for enabling secure communication in Internet of Things
    Singh, Khushal
    Singh, Nanhay
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (03):
  • [39] A Quantum-Safe User Authentication Protocol for the Internet of Things
    Roy, Kumar Sekhar
    Kalita, Hemanta Kumar
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2019, 10 (03): : 178 - 192
  • [40] A Novel Cross-Layer Authentication Protocol for the Internet of Things
    Lee, Yonggu
    Yoon, Jiseok
    Choi, Jinho
    Hwang, Euiseok
    IEEE ACCESS, 2020, 8 : 196135 - 196150