Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things
存储器和机器基于属性的介绍和椭圆形的曲线为事情的因特网的安全的基于密码学的多水平认证作者机构:Department of Computer Science and EngineeringVel Tech Dr.RR&Dr.SR Technical UniversityChennaiIndia
出 版 物:《International Journal of Intelligent Computing and Cybernetics》 (智能计算与控制论国际期刊(英文))
年 卷 期:2017年第10卷第2期
页 面:241-256页
核心收录:
学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)]
主 题:Security Authentication Internet of Things(IoT) Manufacturing systems Networked control DNA computing Elliptic curve cryptography(ECC) Profile table
摘 要:Purpose-Due to the connectivity of the multiple devices and the systems on the same network,rapid development has become possible in Internet of Things(IoTs)for the last ***,IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors,devices and *** order to handle the security challenges,literature presents a handful of security protocols for *** purpose of this paper is to present a threat profiling and elliptic curve cryptography(ECC)-based mutual and multi-level authentication for the security of *** work contains two security attributes like memory and machine-related attributes for maintaining the profile ***,the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed ***,three entities like,IoT device,server and authorization centre(AC)performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted ***,DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active ***/methodology/approach-In this work,the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of *** work contains two security attributes like memory and machine-related attributes for maintaining the profile ***,the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed ***,three entities like,IoT device,server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted ***-DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active ***,at