A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture

نویسندگان

چکیده

The Internet of Things (IoT) has revolutionized practically every industry, including agriculture, due to its fast expansion and integration into other industries. application IoT in agriculture motivates farmers use their resources wisely allows for better field monitoring decision-making, resulting increased agricultural productivity. Because IoT-enabled systems need the various types sensors that collect data (such as soil moisture humidity) then transmit it over network. IoT-based systems, on hand, are always vulnerable security threats. Authentication is one assured options addressing concern, since only enables an authorized party access data. Existing authentication schemes typically Rivest-Shamir-Adleman (RSA) algorithm elliptic curve cryptography (ECC), which a greater computational communication cost. Furthermore, majority existing not verified using any tool. As result, we propose identity-based scheme this article. To ensure our cost-effective, employ hyperelliptic (HECC). Our surpasses terms cost overhead while providing security, according thorough investigation performance security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Directed Path Based Authentication Scheme for the Internet of Things

The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the direct...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

Identity Authentication and Capability based Access Control (IACAC) for the Internet of Things

In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology and weak physical security of low power devices in IoT networks are possible sources for security vu...

متن کامل

Internet of Things based Expert System for Smart Agriculture

Agriculture sector is evolving with the advent of the information and communication technology. Efforts are being made to enhance the productivity and reduce losses by using the state of the art technology and equipment. As most of the farmers are unaware of the technology and latest practices, many expert systems have been developed in the world to facilitate the farmers. However, these expert...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2022

ISSN: ['1530-8669', '1530-8677']

DOI: https://doi.org/10.1155/2022/4275243