scholarly journals Lightweight Authentication Protocol in Internet-of-Things

Author(s):  
Anamika A. Mishra ◽  
Krushnalee Surve ◽  
Devika C. Babu ◽  
Upendra Verma

Internet of Things is the extension of Internet connectivity into physical devices, called IoT devices which are connected to Cloud Servers, which help them perform many functions, including, but not limited to security protocols. However, the distance between the Cloud Server and the end device could hamper the connectivity and also risk the security. Authentication is one of the major issues that needs to be taken care of in this scenario. This paper aims to look into this issue as well as to provide a viable solution.

2018 ◽  
Vol 7 (4.6) ◽  
pp. 388
Author(s):  
G. A. Vani ◽  
M. Metilda Florence

The emergence of Internet of things (IoT) is due to its   ability to dutifully transfer the data through a network. Now the concern is that security is not considered as main priority while developing the product. IoT is prone to vulnerabilities where Botnet and DDoS kind of attacks are common and a major issue that has to be considered these days. Since IoT is in no way resistive to attacks, this paper is all about proposing a solution for the Distributed Denial of Services attack that happens on IoT platform. Light weight authentication is necessary for any IoT devices because to reduce the power consumption and increase the processing speed of the device [16]. The experimental setup is built on OS named Contiki with cooja simulator that suits to all the devices that are in the IoT environment.   


2019 ◽  
Vol 11 (24) ◽  
pp. 7214
Author(s):  
Yoon-Su Jeong ◽  
Dong-Ryool Kim ◽  
Seung-Soo Shin

Wearable and portable medical devices are one of the fastest growing sectors in the Internet of Things (IoT) market. However, medical services specialize in the processing of personal health data, which carries issues that are not faced by other industries. In this paper, we propose a multi-dimensional color vector information based IoT device authentication protocol that can provide benefits for medical work, assuming that a hospital has the capability of integrating IoT devices and has access to patient information. The proposed protocol uses multi-dimensional color vectors to help users who use IoT devices to manage their condition in multiple groups, stochastically. In addition, the proposed protocol provides the health and medical service status of users to medical staff in real time using IoT authentication keys generated through the proposed multi-dimensional color vectors. The proposed protocol not only addresses health care problems yet to be tackled in the management of hospital and health services, but also minimizes administrative time and procedures for current medical services. As a result of the performance evaluation, the proposed protocol improved the efficiency of hospital IoT devices by an average of 31.1%, and the time delay for medical services was improved by 19.8%, compared to the existing protocol. By using the proposed protocol and IoT devices, the average overhead of healthcare providers could be reduced by as much as 15.3%.


2021 ◽  
pp. 1-37
Author(s):  
Michele De Donno ◽  
Xenofon Fafoutis ◽  
Nicola Dragoni

The Internet of Things (IoT) is evolving our society; however, the growing adoption of IoT devices in many scenarios brings security and privacy implications. Current security solutions are either unsuitable for every IoT scenario or provide only partial security. This paper presents AntibIoTic 2.0, a distributed security system that relies on Fog computing to secure IoT devices, including legacy ones. The system is composed of a backbone, made of core Fog nodes and Cloud server, a Fog node acting at the edge as the gateway of the IoT network, and a lightweight agent running on each IoT device. The proposed system offers fine-grained, host-level security coupled with network-level protection, while its distributed nature makes it scalable, versatile, lightweight, and easy to deploy, also for legacy IoT deployments. AntibIoTic 2.0 can also publish anonymized and aggregated data and statistics on the deployments it secures, to increase awareness and push cooperations in the area of IoT security. This manuscript recaps and largely expands previous works on AntibIoTic, providing an enhanced design of the system, an extended proof-of-concept that proves its feasibility and shows its operation, and an experimental evaluation that reports the low computational overhead it causes.


2020 ◽  
Vol 8 (6) ◽  
pp. 4129-4134

Cloud Computing proves to be most predominant innovative field in the area of Information technology. Cloud is best suited for small scale to large scale businesses and personal purposes such as storing, computing, managing data & resources, running applications and many more. Due to increasing large volumes of data over cloud servers created subsequent specific issues like data maintainability, network elasticity, managing Internet of Things (I.o.T’s) devices and many more. Recent progresses in Technology are given rise to fog computing or decentralized cloud to overcome cloud server issues called fog nodes. In this paper we present a brief note on how cloud issues can overcome using fog nodes benefits along with elaboration of load balancing factor. To maintain load balancing of fog nodes no much appreciable work took place in the field of fog computing. This paper proposes a scheduler which receives the devices in to a Job Queue to be connected over cloud. To apply scheduling algorithms like F.C.F.S, S.J.F, P.S, R.R and W.R.R. over fog nodes will be discussed along with their merits & demerits. At last we try to compare the various parameters of load balancing among various scheduling algorithms. In this paper we focus on how fog nodes perform functions like considerable storages, low latency, heterogeneity, allocation & interaction with limited IoT devices and Security along with architecture cloud to fog. During allocation of IoT devices to various fog nodes we will come across a serious issues i.e load balancing on fog nodes. Our detailed study presents the comparison of above mentioned scheduling algorithms load balancing factors such as rich resources allocations & Balancing among fog nodes, Identification of devices, Authentication of fog nodes, bandwidth consumption, location awareness, response time, cost maintenances, Intrusion detection, fault forbearances and maintainability.


2019 ◽  
Vol 6 (6) ◽  
pp. 703
Author(s):  
Eri Haryanto ◽  
Imam Riadi

<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built  a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.</em></p><p><em><strong><br /></strong></em></p>


2013 ◽  
Vol 457-458 ◽  
pp. 770-773
Author(s):  
Hui Xia

Weak security of RFID system is concerned by more and more people because of the fast development of internet of things. Some existing RFID authentications protocols begin to be analyzed, such as Mutual three-pass authentication, randomized Hash-Lock, which has some problem of being difficult to resist a variety of network attacks such as forgery tag attacks and a new bidirectional security authentication protocol,A multiple security authentication protocol is proposed to overcome the disadvantage of being vulnerable to cyber attacks. Analysis shows that this approach is of good security and privacy, low cost, and high efficiency.


Sign in / Sign up

Export Citation Format

Share Document