{"title":"Authentication and Trustful Communication Protocol for IoT Devices","authors":"Seiya Kobayashi, T. Miyazaki","doi":"10.1109/IMCOM51814.2021.9377369","DOIUrl":null,"url":null,"abstract":"This study proposes a network protocol that enables connecting Internet-of-Things (IoT) devices to IoT servers without modifying the original IoT service applications. Access proxies, introduced at the edge of an IoT network cloud, intercept packets flowing between the IoT devices and servers, and examine the credibility of each loT device in real time. After registering a new IoT device using an access proxy, the data produced by the IoT device or the server were significantly protected. Intended attacks and spoofing were also blocked at the access proxies. Therefore, IoT services are safe for use in the proposed network environment.","PeriodicalId":275121,"journal":{"name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCOM51814.2021.9377369","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This study proposes a network protocol that enables connecting Internet-of-Things (IoT) devices to IoT servers without modifying the original IoT service applications. Access proxies, introduced at the edge of an IoT network cloud, intercept packets flowing between the IoT devices and servers, and examine the credibility of each loT device in real time. After registering a new IoT device using an access proxy, the data produced by the IoT device or the server were significantly protected. Intended attacks and spoofing were also blocked at the access proxies. Therefore, IoT services are safe for use in the proposed network environment.