• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Wazid, M. (Wazid, M..) [1] | Das, A.K. (Das, A.K..) [2] | Bhat, K, V. (Bhat, K, V..) [3] | Vasilakos, A.V. (Vasilakos, A.V..) [4]

Indexed by:

Scopus

Abstract:

Internet of Things (IoT) becomes a new era of the Internet, which consists of several connected physical smart objects (i.e., sensing devices) through the Internet. IoT has different types of applications, such as smart home, wearable devices, smart connected vehicles, industries, and smart cities. Therefore, IoT based applications become the essential parts of our day-to-day life. In a cloud-based IoT environment, cloud platform is used to store the data accessed from the IoT sensors. Such an environment is greatly scalable and it supports real-time event processing which is very important in several scenarios (i.e., IoT sensors based surveillance and monitoring). Since some applications in cloud-based IoT are very critical, the information collected and sent by IoT sensors must not be leaked during the communication. To accord with this, we design a new lightweight authentication mechanism in cloud-based IoT environment, called LAM-CIoT. By using LAM-CIoT, an authenticated user can access the data of IoT sensors remotely. LAM-CIoT applies efficient “one-way cryptographic hash functions” along with “bitwise XOR operations”. In addition, fuzzy extractor mechanism is also employed at the user's end for local biometric verification. LAM-CIoT is methodically analyzed for its security part through the formal security using the broadly-accepted “Real-Or-Random (ROR)” model, formal security verification using the widely-used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool as well as the informal security analysis. The performance analysis shows that LAM-CIoT offers better security, and low communication and computation overheads as compared to the closely related authentication schemes. Finally, LAM-CIoT is evaluated using the NS2 network simulator for the measurement of network performance parameters that envisions the impact of LAM-CIoT on the network performance of LAM-CIoT and other schemes. © 2019 Elsevier Ltd

Keyword:

Authentication; AVISPA simulation; Cloud computing; Internet of Things (IoT); Key agreement; Security

Community:

  • [ 1 ] [Wazid, M.]Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, 248 002, India
  • [ 2 ] [Das, A.K.]Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500032, India
  • [ 3 ] [Bhat K, V.]Centre for Cryptography, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, 576 104, India
  • [ 4 ] [Bhat K, V.]Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka 576 104, India
  • [ 5 ] [Vasilakos, A.V.]Department of Computer Science, Electrical and Space Engineering, Lulea University of Technology, Lulea, 97187, Sweden
  • [ 6 ] [Vasilakos, A.V.]Department of Computer Science and Technology, Fuzhou University, Fujian, 350116, China

Reprint 's Address:

  • [Das, A.K.]Center for Security, Theory and Algorithmic Research, International Institute of Information TechnologyIndia

Show more details

Related Keywords:

Related Article:

Source :

Journal of Network and Computer Applications

ISSN: 1084-8045

Year: 2020

Volume: 150

6 . 2 8 1

JCR@2020

7 . 7 0 0

JCR@2023

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 158

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:416/9701942
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1