首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:An Optimized Protocol of M2M Authentication for Internet of Things (IoT)
  • 本地全文:下载
  • 作者:Mohamed M. Samy ; Wagdy R. Anis. ; Ahmed A. Abdel-Hafez
  • 期刊名称:International Journal of Computer Network and Information Security
  • 印刷版ISSN:2074-9090
  • 电子版ISSN:2231-4946
  • 出版年度:2021
  • 卷号:13
  • 期号:2
  • 页码:29-38
  • DOI:10.5815/ijcnis.2021.02.03
  • 出版社:MECS Publisher
  • 摘要:The Internet of Things (IoT) consists of sensors, networks, and services to connect and control production systems. Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices are enabled to exchange information with each other in an autonomous way without human intervention. Resource-Constrained Devices (RCD) have found an expanding demand in the Internet of Things (IoT) applications as these gadgets are essentially working with delicate information. Thus, information security has ended up vital for both makers and clients. However, the creation of defenseless gadgets still challenging regarding the restriction of involved assets especially with the attackers ‘continuous trials to misuse these restrictions chasing important information. Hence, connecting an open key crypto-system becomes a must to extend gadget proficiency and relieve the chance of touchy data loss. Deployments of Elliptic curve cryptography (ECC) are fundamentally an open key crypto-system with the basic distinction of speedier advancing capacity whereas yielding an assortment of distinctive approaches to the arrangement of the cryptographic calculation. We will submit a proposed protocol to overcome the demands of information security and the speed of data circulation. The proposed protocol is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against various attacks.
  • 关键词:Resource-Constrained Devices (RCD);Automated Validation of Internet Security Protocols and Applications tools(AVISPA);Internet of Things (IoT);Elliptic curve cryptography (ECC);Public Key Cryptography (PKC)
国家哲学社会科学文献中心版权所有