Javascript must be enabled to continue!
Progressive and Fast Authentication Large-Scale Internet of Things
View through CrossRef
Security provisioning has become the most important design consideration for large-scale Internet of Things (IoT) systems due to their critical roles to support diverse vertical applications by connecting heterogeneous devices, machines and industry processes. Conventional authentication and authorization schemes are insufficient in dealing the emerging IoT security challenges due to their reliance on both static digital mechanisms and computational complexity for improving security level. Furthermore, the isolated security designs for different layers and link segments while ignoring the overall protection lead to cascaded security risks as well as growing communication latency and overhead. Potential security risks and attacks could lead to catastrophic consequences and cause avalanche-like damages in large-scale IoT networks. This is mainly due to the critical roles of IoT to support a wide variety of vertical applications by connecting tremendous heterogeneous devices, machines and industry processes, as well as cascaded reaction from the enormous parallel interconnection contained in IoT. Moreover, the widely used resource-constrained devices, e.g. sensors, can be compromised easily, thus resulting in widely distributed threats to the IoT network through data injection, spoofing, eavesdropping, and so on. Challenges for Conventional Authentication and Authorization in Large-Scale IoT: The conventional authentication and authorization methods, including key-based cryptography techniques and physical layer key generation techniques, may suffer from their high complexity and long latency, and may be ineffective to adapt to the complex dynamic environment, especially in large-scale IoT networks[1, 2]. Long security induced latency in large-scale IoT. The conventional cryptography techniques require increased overhead and lengthy process for increased level of security, thus leading to high communication and computation overhead, more importantly, long communication latency[3]. These are intolerable for the large-scale IoT network having significantly increasing number of intelligent machines and resource-constrained devices with concurrent communications[4]. Ineffective adaptation to complex dynamic IoT environment. Conventional security solutions may also suffer from cascading risks in complex dynamic IoT scenarios due to their reliance on static binary authentication/authorization mechanisms[5, 6].
Title: Progressive and Fast Authentication Large-Scale Internet of Things
Description:
Security provisioning has become the most important design consideration for large-scale Internet of Things (IoT) systems due to their critical roles to support diverse vertical applications by connecting heterogeneous devices, machines and industry processes.
Conventional authentication and authorization schemes are insufficient in dealing the emerging IoT security challenges due to their reliance on both static digital mechanisms and computational complexity for improving security level.
Furthermore, the isolated security designs for different layers and link segments while ignoring the overall protection lead to cascaded security risks as well as growing communication latency and overhead.
Potential security risks and attacks could lead to catastrophic consequences and cause avalanche-like damages in large-scale IoT networks.
This is mainly due to the critical roles of IoT to support a wide variety of vertical applications by connecting tremendous heterogeneous devices, machines and industry processes, as well as cascaded reaction from the enormous parallel interconnection contained in IoT.
Moreover, the widely used resource-constrained devices, e.
g.
sensors, can be compromised easily, thus resulting in widely distributed threats to the IoT network through data injection, spoofing, eavesdropping, and so on.
Challenges for Conventional Authentication and Authorization in Large-Scale IoT: The conventional authentication and authorization methods, including key-based cryptography techniques and physical layer key generation techniques, may suffer from their high complexity and long latency, and may be ineffective to adapt to the complex dynamic environment, especially in large-scale IoT networks[1, 2].
Long security induced latency in large-scale IoT.
The conventional cryptography techniques require increased overhead and lengthy process for increased level of security, thus leading to high communication and computation overhead, more importantly, long communication latency[3].
These are intolerable for the large-scale IoT network having significantly increasing number of intelligent machines and resource-constrained devices with concurrent communications[4].
Ineffective adaptation to complex dynamic IoT environment.
Conventional security solutions may also suffer from cascading risks in complex dynamic IoT scenarios due to their reliance on static binary authentication/authorization mechanisms[5, 6].
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
This paper addresses the want for evaluating consumer authentication protocols and protection algorithms for
networks. Specially, this paper specializes in the effectiveness and sa...
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract
Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract
Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
AbstractIn the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper prop...

