A Robust Anonymity Preserving Authentication Protocol for IoT Devices
Title | A Robust Anonymity Preserving Authentication Protocol for IoT Devices |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Tewari, A., Gupta, B. B. |
Conference Name | 2018 IEEE International Conference on Consumer Electronics (ICCE) |
Keywords | anonymity, authentication, composability, cryptographic protocols, data privacy, ECC, efficient public key cryptography mechanism, Generators, Human Behavior, human factors, Internet of Things, IoT devices, lightweight authentication, message authentication, Metrics, online threat, privacy, Protocols, pubcrawl, public key cryptography, radiofrequency identification, resilience, Resiliency, robust anonymity preserving authentication protocol, security mechanisms, Servers, telecommunication security |
Abstract | In spite of being a promising technology which will make our lives a lot easier we cannot be oblivious to the fact IoT is not safe from online threat and attacks. Thus, along with the growth of IoT we also need to work on its aspects. Taking into account the limited resources that these devices have it is important that the security mechanisms should also be less complex and do not hinder the actual functionality of the device. In this paper, we propose an ECC based lightweight authentication for IoT devices which deploy RFID tags at the physical layer. ECC is a very efficient public key cryptography mechanism as it provides privacy and security with lesser computation overhead. We also present a security and performance analysis to verify the strength of our proposed approach. |
URL | https://ieeexplore.ieee.org/document/8326282 |
DOI | 10.1109/ICCE.2018.8326282 |
Citation Key | tewariRobustAnonymityPreserving2018 |
- message authentication
- telecommunication security
- Servers
- security mechanisms
- robust anonymity preserving authentication protocol
- Resiliency
- resilience
- radiofrequency identification
- public key cryptography
- pubcrawl
- Protocols
- privacy
- online threat
- Metrics
- anonymity
- lightweight authentication
- IoT devices
- Internet of Things
- Human Factors
- Human behavior
- Generators
- efficient public key cryptography mechanism
- ECC
- data privacy
- Cryptographic Protocols
- composability
- authentication