An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things

被引:0
|
作者
Sunggyun Jang
Ducsun Lim
Jinyeong Kang
Inwhee Joe
机构
[1] Hanyang University,Department of Electronics and Computer Engineering
来源
关键词
Merkle Tree; Root Hash; MAC (Message Authentication Code); IoT (Internet of Things) security; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless network devices are used for the Internet of Things in a variety of applications, and although the IoT has many benefits, there are some security issues in this area. Hacking tools that are widely used in wireless communication enable the attacker to export the information stored in the device memory. Devices within the IoT should not allow this information to be accessed without an authentication. In this paper, we propose an efficient device authentication protocol without certification authority for the Internet of Things. Compared to the existing Constrained Application Protocol, the proposed protocol increases efficiency by minimizing the number of message exchanges. Since our protocol is based on a keyed hash algorithm, the Certificate of Authority is not required. Experimental results show that the proposed authentication protocol improves the security level and reduces the resource consumption of devices.
引用
收藏
页码:1681 / 1695
页数:14
相关论文
共 50 条
  • [41] Lightweight and Secure Authentication Protocol for the Internet of Things in Vehicular Systems
    Arasteh, Sima
    Ashouri-Talouki, Maede
    Aghili, Seyed Farhad
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 1 - 7
  • [42] A PUF-based Mutual Authentication Protocol for Internet of Things
    Satamraju, Krishna Prasad
    Malarkodi, B.
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [43] Radio Frequency Fingerprint Identification for Device Authentication in the Internet of Things
    Zhang, Junqing
    Shen, Guanxiong
    Saad, Walid
    Chowdhury, Kaushik
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (10) : 110 - 115
  • [44] A Study on the Device Authentication and Key Distribution Method for Internet of Things
    Lee, Jae-Young
    Cho, Do-Eun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 365 - 374
  • [45] A multi-device user authentication mechanism for Internet of Things
    Eman, Raihan Dewon
    Jahan, Mosarrat
    Kabir, Upama
    IET NETWORKS, 2023, 12 (05) : 229 - 249
  • [46] An efficient device authentication protocol using bioinformatic
    Jeong, Yoon-Su
    Lee, Bong-Keun
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 567 - +
  • [47] An efficient device authentication protocol using bioinformatic
    Jeong, Yoon-Su
    Lee, Bong-Keun
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 855 - 858
  • [48] Efficient Mutual Authentication Protocol between Hospital Internet of Things Devices Using Probabilistic Attribute Information
    Jeong, Yoon-Su
    Kim, Dong-Ryool
    Shin, Seung-Soo
    SUSTAINABILITY, 2019, 11 (24)
  • [49] Monitoring Connectivity of Internet of Things Device on Zigbee Protocol
    Purnama, Benni
    Sharipuddin
    Kurniabudi
    Budiarto, Rahmat
    Stiawan, Deris
    Hanapi, Darmawijoyo
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (ICECOS), 2018, : 351 - 355
  • [50] ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems
    Roy, Prasanta Kumar
    Kumar, Pankaj
    Bhattacharya, Ansuman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 163