Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Development of Authenticated Key Exchange Protocol for IoT Sensor Layer

View through CrossRef
An authenticated key exchange for the Internet of Things (IoT) sensor layer is discussed in this paper. This paper presents an enhanced key exchange protocol to provide an authentication scheme and data confidentiality for IoT sensor layer. In our approach, we incorporate an identity-based authentication scheme into the existing key exchange protocol based on Elliptic Curve Diffie Hellman (ECDH). We utilize two communication channels for the process, main channel and auxiliary channel. The main channel is used to exchange key and sensor data and the auxiliary channel is used to exchange the identity information prior to the key exchange process. To provide the data confidentiality, AES encryption algorithm is implemented with a key derived from shared secret key to ensure the Perfect Forward Secrecy. For the evaluations, there are four parameters that are evaluated: the protocol resistance, formal verification of protocol, the protocol security, and performance testing. The protocol resistance was evaluated using security analysis against common security threats on IoT sensor layer. The formal verification of the proposed protocol was evaluated using Scyther, and the protocol security was evaluated using attack scenarios (i.e., authentication and sniffing attack) to prove the authentication and confidentiality. The performance testing was conducted to measure time complexity and memory complexity of the protocol. The experiment results show that the proposed protocol is able to provide an authentication mechanism, data confidentiality, and resilience against common security threats at IoT sensor layers.
Title: Development of Authenticated Key Exchange Protocol for IoT Sensor Layer
Description:
An authenticated key exchange for the Internet of Things (IoT) sensor layer is discussed in this paper.
This paper presents an enhanced key exchange protocol to provide an authentication scheme and data confidentiality for IoT sensor layer.
In our approach, we incorporate an identity-based authentication scheme into the existing key exchange protocol based on Elliptic Curve Diffie Hellman (ECDH).
We utilize two communication channels for the process, main channel and auxiliary channel.
The main channel is used to exchange key and sensor data and the auxiliary channel is used to exchange the identity information prior to the key exchange process.
To provide the data confidentiality, AES encryption algorithm is implemented with a key derived from shared secret key to ensure the Perfect Forward Secrecy.
For the evaluations, there are four parameters that are evaluated: the protocol resistance, formal verification of protocol, the protocol security, and performance testing.
The protocol resistance was evaluated using security analysis against common security threats on IoT sensor layer.
The formal verification of the proposed protocol was evaluated using Scyther, and the protocol security was evaluated using attack scenarios (i.
e.
, authentication and sniffing attack) to prove the authentication and confidentiality.
The performance testing was conducted to measure time complexity and memory complexity of the protocol.
The experiment results show that the proposed protocol is able to provide an authentication mechanism, data confidentiality, and resilience against common security threats at IoT sensor layers.

Related Results

Dynamic stochastic modeling for inertial sensors
Dynamic stochastic modeling for inertial sensors
Es ampliamente conocido que los modelos de error para sensores inerciales tienen dos componentes: El primero es un componente determinista que normalmente es calibrado por el fabri...
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Through sensor networks, agriculture can be connected to the IoT, which allows us to create connections among agronomists, farmers, and crops regardless of their geographical diffe...
TAKE-IoT
TAKE-IoT
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of I...
Faulty sensor detection using multi-variate sensors in internet of things (IoTs)
Faulty sensor detection using multi-variate sensors in internet of things (IoTs)
IoT devices are lightweight and have limited computational capabilities often exposed to harsh environments, which can cause failure on the IoT devices [1, 2].  The failure on the ...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
IoT: A Boon for Advancement of Technology
IoT: A Boon for Advancement of Technology
Abstract: Internet of Things (IoT) is a new model that has turned the traditional lifestyle into a high-tech lifestyle. Smart city, smart home, pollution control, energy saving, sm...
FUTURISTIC TRENDS IN IOT
FUTURISTIC TRENDS IN IOT
Researchers, academics, and industry specialists will have an excellent forum to exchange ideas and expertise through this book series. There will be publications on a number of cu...
Técnicas de reconstrucción y compensación activa de frentes de onda complejos
Técnicas de reconstrucción y compensación activa de frentes de onda complejos
The continuous improvements of optical design tools and manufacturing technologies of free-form optical elements, allow the creation of new complex-shaped lenses that improve the p...

Back to Top