A robust authentication scheme for observing resources in the internet of things environment

Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

64 Citations (Scopus)

Abstract

The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital world. There are a lot of speculations and future forecasts about the Internet of Things devices. However, most of them are vendor specific and lack a unified standard, which renders their seamless integration and interoperable operations. Another major concern is the lack of security features in these devices and their corresponding products. Most of them are resource-starved and unable to support computationally complex and resource consuming secure algorithms. In this paper, we have proposed a lightweight mutual authentication scheme which validates the identities of the participating devices before engaging them in communication for the resource observation. Our scheme incurs less connection overhead and provides a robust defence solution to combat various types of attacks.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages205-211
Number of pages7
ISBN (Electronic)9781479965137
DOIs
Publication statusPublished - 15 Jan 2015
Externally publishedYes
Event13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 - Beijing, China
Duration: 24 Sept 201426 Sept 2014

Publication series

NameProceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014

Conference

Conference13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
Country/TerritoryChina
CityBeijing
Period24/09/1426/09/14

Keywords

  • Authentication
  • CoAP
  • Conditional option
  • Internet of things (IoT)
  • Resource observation

ASJC Scopus subject areas

  • Computer Science Applications
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A robust authentication scheme for observing resources in the internet of things environment'. Together they form a unique fingerprint.

Cite this