A Multi-Stage Secure IoT Authentication Protocol
作者机构:College of Computing and InformaticsSaudi Electronic UniversityRiyadh11673Saudi Arabia King Abdullah II School for Information TechnologyThe University of JordanAmman11942Jordan
出 版 物:《Computer Systems Science & Engineering》 (计算机系统科学与工程(英文))
年 卷 期:2023年第45卷第4期
页 面:459-481页
核心收录:
学科分类:0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学]
基 金:Saudi Electronic University
主 题:Internet of Things(IoT) security authentication BAN logic sensor networks
摘 要:The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human *** can connect millions of devices across the *** ability to collect information,perform analysis,and even come to meaningful conclusions without human capital intervention *** circumstances require stringent security measures and,in particular,the extent of *** applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious,wrongly authenticated device finds its way into the IoT *** research provides a clear and updated view of the trends in the IoT authentication *** the issues covered include a series of authentication protocols that have remained research gaps in various *** study applies a comparative evaluation of authentication protocols,including their strengths and ***,it forms the foundation in the IoT authentication field of *** that direction,a multi authentication architecture that involves secured means is proposed for protocol *** analysis can affect the security of the ***-Abadi-Needham(BAN)logic provides proof of the attainment of mutual ***3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.