Iot-1-pass-security: 1(one)-pass Authenticated Key Agreement Protocol for Energy Constraint Iot Applications
نویسندگان
چکیده
IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resourceconstrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communication among the sender and receiver to establish a secure session, providing a balance between security (data confidentiality with integrity) and performance. We implemented and performed comprehensive power consumption and timing analysis of our implementation on Contiki platform to demonstrate the efficiency of the proposed protocol.
منابع مشابه
Ultra Low Power Symmetric Pass Gate Adiabatic Logic with CNTFET for Secure IoT Applications
With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملAn Efficient and Secure Three-pass Authenticated Key Agreement Elliptic Curve Based Protocol
Key agreement protocols are a fundamental building block of cryptography to establish a common secret key over public network. We propose an efficient and secure three-pass authenticated key agreement protocol based on elliptic curve where three-pass protocols have significant advantages over two-pass in terms of security properties and applications. The three-pass protocols can prevent denial ...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016