{"title":"基于动态密钥和上下文感知的物联网认证方法","authors":"M. Mehta, Kajal S. Patel","doi":"10.4018/ijossp.310939","DOIUrl":null,"url":null,"abstract":"Internet of things can be defined as collection of different physical that can converse with each other without any interruption. The IoT applications have the capability to change the current scenario of various domains such as health service, agriculture, and so on by offering services that can offer luxury to human life and also increases effectiveness. IoT follows open framework. Because of that it presents an opportunity to adversary for easily targeting system by performing various cyber-attacks. Existing well known cryptography solutions cannot be implemented in IoT as it has limitations in terms of resource ownership and also storage capacity. The authors have designed an efficient and secure multi-factor IoT authentication algorithm that is lightweight and provides the protection against different security threats such as MITM, replay, and location spoofing threat. Suggested work is tested on the tool AVISPA for the security validation. Communication and computational cost is low for the suggested work in comparison with the existing work.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"10 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach\",\"authors\":\"M. Mehta, Kajal S. Patel\",\"doi\":\"10.4018/ijossp.310939\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of things can be defined as collection of different physical that can converse with each other without any interruption. The IoT applications have the capability to change the current scenario of various domains such as health service, agriculture, and so on by offering services that can offer luxury to human life and also increases effectiveness. IoT follows open framework. Because of that it presents an opportunity to adversary for easily targeting system by performing various cyber-attacks. Existing well known cryptography solutions cannot be implemented in IoT as it has limitations in terms of resource ownership and also storage capacity. The authors have designed an efficient and secure multi-factor IoT authentication algorithm that is lightweight and provides the protection against different security threats such as MITM, replay, and location spoofing threat. Suggested work is tested on the tool AVISPA for the security validation. Communication and computational cost is low for the suggested work in comparison with the existing work.\",\"PeriodicalId\":53605,\"journal\":{\"name\":\"International Journal of Open Source Software and Processes\",\"volume\":\"10 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Open Source Software and Processes\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijossp.310939\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Open Source Software and Processes","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijossp.310939","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach
Internet of things can be defined as collection of different physical that can converse with each other without any interruption. The IoT applications have the capability to change the current scenario of various domains such as health service, agriculture, and so on by offering services that can offer luxury to human life and also increases effectiveness. IoT follows open framework. Because of that it presents an opportunity to adversary for easily targeting system by performing various cyber-attacks. Existing well known cryptography solutions cannot be implemented in IoT as it has limitations in terms of resource ownership and also storage capacity. The authors have designed an efficient and secure multi-factor IoT authentication algorithm that is lightweight and provides the protection against different security threats such as MITM, replay, and location spoofing threat. Suggested work is tested on the tool AVISPA for the security validation. Communication and computational cost is low for the suggested work in comparison with the existing work.
期刊介绍:
The International Journal of Open Source Software and Processes (IJOSSP) publishes high-quality peer-reviewed and original research articles on the large field of open source software and processes. This wide area entails many intriguing question and facets, including the special development process performed by a large number of geographically dispersed programmers, community issues like coordination and communication, motivations of the participants, and also economic and legal issues. Beyond this topic, open source software is an example of a highly distributed innovation process led by the users. Therefore, many aspects have relevance beyond the realm of software and its development. In this tradition, IJOSSP also publishes papers on these topics. IJOSSP is a multi-disciplinary outlet, and welcomes submissions from all relevant fields of research and applying a multitude of research approaches.