A New Authentication Scheme with Elliptical Curve Cryptography for Internet of Things (IoT) Environments
-
2018-05-07 https://doi.org/10.14419/ijet.v7i2.26.14364 -
Internet of Things, Authentication Scheme, Wireless Sensor Networks, Gate Way Node, Sensor Node, User. -
Abstract
Internet of Things (IoT) consists of a large number of connected objects that are communicating with each other. To support trusted communication between IoT objects, the authentication procedures should be used and applied to the communicating entities. Internet of Things (IoT) is an emerging technology, which makes the remote sensing and control across the heterogeneous network a reality, and has good prospects in industrial applications. As an essential infrastructure, Wireless Sensor Networks (WSNs) play a crucial role in industrial IoT. Due to the resource-constrained feature of sensor nodes, the design of security and efficiency balanced authentication scheme for WSNs becomes a significant challenge in IoT applications. In this paper, an anonymous authentication scheme for WSNs in an Internet of Things environments.
Â
Â
-
References
[1] Moghaddam, Faraz Fatemi, et al. "A scalable and efficient user authentication scheme for cloud computing environments." Region 10 Symposium, 2014 IEEE. IEEE, 2014.
[2] Singh, Ashish, and Kakali Chatterjee. "A secure multi-tier authentication scheme in cloud computing environment." Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on. IEEE, 2015.
[3] Yang, Jen Ho, and Pei Yu Lin. "An ID-based user authentication scheme for cloud computing." Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on. IEEE, 2014.
[4] Chen, Tien-Ho, Hsiu-lien Yeh, and Wei-Kuan Shih. "An advanced ECC dynamic id-based remote mutual authentication scheme for cloud computing." Multimedia and Ubiquitous Engineering (MUE), 2011 5th FTRA International Conference on. IEEE, 2011.
[5] Tsai, Jia-Lun, and Nai-Wei Lo. "A privacy-aware authentication scheme for distributed mobile cloud computing services." IEEE systems journal 9.3 (2015): 805-815.
[6] Powell, Courtney, Takashi Aizawa, and Masaharu Munetomo. "Design of an SSO authentication infrastructure for heterogeneous inter-cloud environments." Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on. IEEE, 2014.
[7] Peng, Siwei. "An Id-based Multiple Authentication scheme against attacks in wireless sensor networks." Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on. Vol. 3. IEEE, 2012.
[8] Nguyen, Tien Dung, and Eui-Nam Huh. "A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems." Int. Arab J. Inf. Technol. 9.6 (2012): 511-519.
[9] Chu, Fuzhi, et al. "An improved identity authentication scheme for internet of things in heterogeneous networking environments." Network-Based Information Systems (NBiS), 2013 16th International Conference on. IEEE, 2013.
[10] Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and access control in the internet of things." Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. IEEE, 2012.
[11] Jan, Mian Ahmad, et al. "A robust authentication scheme for observing resources in the internet of things environment." Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. IEEE, 2014.
[12] Shankar, K., and P. Eswaran. "RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography." China Communications 14.2 (2017): 118-130.
Shankar, K., and P. Eswaran. "RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique." Journal of Circuits, Systems and Computers 25.11 (2016): 1650138
-
Downloads
-
How to Cite
Durairaj, M., & Muthuramalingam, K. (2018). A New Authentication Scheme with Elliptical Curve Cryptography for Internet of Things (IoT) Environments. International Journal of Engineering & Technology, 7(2.26), 119-124. https://doi.org/10.14419/ijet.v7i2.26.14364Received date: 2018-06-19
Accepted date: 2018-06-19
Published date: 2018-05-07