Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Development of Authenticated Key Exchange Protocol for IoT Sensor Layer

View through CrossRef
An authenticated key exchange for the Internet of Things (IoT) sensor layer is discussed in this paper. This paper presents an enhanced key exchange protocol to provide an authentication scheme and data confidentiality for IoT sensor layer. In our approach, we incorporate an identity-based authentication scheme into the existing key exchange protocol based on Elliptic Curve Diffie Hellman (ECDH). We utilize two communication channels for the process, main channel and auxiliary channel. The main channel is used to exchange key and sensor data and the auxiliary channel is used to exchange the identity information prior to the key exchange process. To provide the data confidentiality, AES encryption algorithm is implemented with a key derived from shared secret key to ensure the Perfect Forward Secrecy. For the evaluations, there are four parameters that are evaluated: the protocol resistance, formal verification of protocol, the protocol security, and performance testing. The protocol resistance was evaluated using security analysis against common security threats on IoT sensor layer. The formal verification of the proposed protocol was evaluated using Scyther, and the protocol security was evaluated using attack scenarios (i.e., authentication and sniffing attack) to prove the authentication and confidentiality. The performance testing was conducted to measure time complexity and memory complexity of the protocol. The experiment results show that the proposed protocol is able to provide an authentication mechanism, data confidentiality, and resilience against common security threats at IoT sensor layers.
Title: Development of Authenticated Key Exchange Protocol for IoT Sensor Layer
Description:
An authenticated key exchange for the Internet of Things (IoT) sensor layer is discussed in this paper.
This paper presents an enhanced key exchange protocol to provide an authentication scheme and data confidentiality for IoT sensor layer.
In our approach, we incorporate an identity-based authentication scheme into the existing key exchange protocol based on Elliptic Curve Diffie Hellman (ECDH).
We utilize two communication channels for the process, main channel and auxiliary channel.
The main channel is used to exchange key and sensor data and the auxiliary channel is used to exchange the identity information prior to the key exchange process.
To provide the data confidentiality, AES encryption algorithm is implemented with a key derived from shared secret key to ensure the Perfect Forward Secrecy.
For the evaluations, there are four parameters that are evaluated: the protocol resistance, formal verification of protocol, the protocol security, and performance testing.
The protocol resistance was evaluated using security analysis against common security threats on IoT sensor layer.
The formal verification of the proposed protocol was evaluated using Scyther, and the protocol security was evaluated using attack scenarios (i.
e.
, authentication and sniffing attack) to prove the authentication and confidentiality.
The performance testing was conducted to measure time complexity and memory complexity of the protocol.
The experiment results show that the proposed protocol is able to provide an authentication mechanism, data confidentiality, and resilience against common security threats at IoT sensor layers.

Related Results

Dynamic stochastic modeling for inertial sensors
Dynamic stochastic modeling for inertial sensors
Es ampliamente conocido que los modelos de error para sensores inerciales tienen dos componentes: El primero es un componente determinista que normalmente es calibrado por el fabri...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Implementation of Faulty Sensor Detection Mechanism using Data Correlation of Multivariate Sensor Readings in Smart Agriculture
Through sensor networks, agriculture can be connected to the IoT, which allows us to create connections among agronomists, farmers, and crops regardless of their geographical diffe...
Detectability of an intermediate layer by magnetotelluric sounding
Detectability of an intermediate layer by magnetotelluric sounding
Abstract The recent publication by Verma and Mallick (1979) on the detectability of an intermediate layer by time domain EM sounding provides some informative ans...
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
Abstract: This research focuses on technology and integration tools for IoT environments, with an emphasis on three main aspects: the integration of Building Information Modeling (...
TAKE-IoT
TAKE-IoT
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of I...
Applications of Ontology in the Internet of Things: A Systematic Analysis
Applications of Ontology in the Internet of Things: A Systematic Analysis
Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and obj...
A Tutorial on Agricultural IoT: Fundamental Concepts, Architectures, Routing, and Optimization
A Tutorial on Agricultural IoT: Fundamental Concepts, Architectures, Routing, and Optimization
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and pe...

Back to Top