期刊论文详细信息
International Journal of Information Technology
Comparison of Authentication Methods in Internet of Things Technology
Hafizah Che Hasan ; Fateen Nazwa Yusof ; Maslina Daud
关键词: Internet of Things;    authentication;    PUF ECC;    keyed hash scheme protocol.;   
DOI  :  10.1999/1307-6892/10009096
学科分类:计算机应用
来源: World Academy of Science, Engineering and Technology (W A S E T)
PDF
【 摘 要 】

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201910286695162ZK.pdf 149KB PDF download
  文献评价指标  
  下载次数:8次 浏览次数:12次