New Enhanced Authentication Protocol for Internet of Things

被引:73
作者
Azrour, Mourade [1 ]
Mabrouki, Jamal [2 ]
Guezzaz, Azedine [3 ]
Farhaoui, Yousef [1 ]
机构
[1] Moulay Ismail Univ, Fac Sci & Tech, Dept Comp Sci, IDMS Team, Errachidia 52000, Morocco
[2] Mohammed V Univ Rabat, Lab Spect Mol Modeling Mat Nanomat Water & Enviro, CERNE2D, Fac Sci, Rabat 10000, Morocco
[3] Cadi Ayyad Univ, High Sch Technol, Dept Comp Sci & Math, Marrakech 40000, Morocco
来源
BIG DATA MINING AND ANALYTICS | 2021年 / 4卷 / 01期
关键词
authetication; Internet of Things (IoT); sensor; security; authorization; WIRELESS SENSOR NETWORKS; SCHEME; CHALLENGES; SECURE; IOT;
D O I
10.26599/BDMA.2020.9020010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely. Nowadays, due to its multiple advantages, the IoT is useful in many areas like environment, water monitoring, industry, public security, medicine, and so on. For covering all spaces and operating correctly, the IoT benefits from advantages of other recent technologies, like radio frequency identification, wireless sensor networks, big data, and mobile network. However, despite of the integration of various things in one network and the exchange of data among heterogeneous sources, the security of user's data is a central question. For this reason, the authentication of interconnected objects is received as an interested importance. In 2012, Ye et al. suggested a new authentication and key exchanging protocol for Internet of things devices. However, we have proved that their protocol cannot resist to various attacks. In this paper, we propose an enhanced authentication protocol for IoT. Furthermore, we present the comparative results between our proposed scheme and other related ones.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 42 条
  • [1] Azrour M, 2019, STUD BIG DATA, V53, P67, DOI 10.1007/978-3-030-12048-1_9
  • [2] Bakar NAA, 2019, Indo J Electr Eng Comp Sci., V15, P414, DOI [10.11591/ijeecs.v15.i1.pp414-420, DOI 10.11591/IJEECS.V15.I1.PP414-420]
  • [3] Environmental monitoring using autonomous vehicles: a survey of recent searching techniques
    Bayat, Behzad
    Crasta, Naveena
    Crespi, Alessandro
    Pascoal, Antonio M.
    Ijspeert, Auke
    [J]. CURRENT OPINION IN BIOTECHNOLOGY, 2017, 45 : 76 - 84
  • [4] Bayat M., 2019, Int. J. Netw. Secur, V21, P897
  • [5] A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
    Chang, Chin-Chen
    Le, Hai-Duong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 357 - 366
  • [6] Chawla MN, 2020, International Journal of Recent Research Aspects, V7, P9
  • [7] Cremers C. J. F, SCYTHER TOOL VERIFIC, DOI [10.1007/978-3-540-70545-138, DOI 10.1007/978-3-540-70545-138]
  • [9] Multi-factor user authentication scheme for IoT-based healthcare services
    Dhillon P.K.
    Kalra S.
    [J]. Dhillon, Parwinder Kaur (parwindhillon@gmail.com), 2018, Springer Science and Business Media Deutschland GmbH (04) : 141 - 160
  • [10] A NETWORK ARCHITECTURE SOLUTION FOR EFFICIENT IOT WSN BACKHAULING: CHALLENGES AND OPPORTUNITIES
    Fantacci, Romano
    Pecorella, Tommaso
    Viti, Roberto
    Carlini, Camillo
    [J]. IEEE WIRELESS COMMUNICATIONS, 2014, 21 (04) : 113 - 119