• Tidak ada hasil yang ditemukan

A trustworthy, reliable and lightweight privacy and data integrity approach for the internet of things

N/A
N/A
Protected

Academic year: 2024

Membagikan "A trustworthy, reliable and lightweight privacy and data integrity approach for the internet of things"

Copied!
1
0
0

Teks penuh

(1)

A trustworthy, reliable and lightweight privacy and data integrity approach for the internet of things

ABSTRACT

Data integrity and authenticity are among the key challenges faced by the interacting devices of Internet of Things (IoT). The resource-constrained nature of sensor-embedded devices make it even more difficult to design lightweight security schemes for these networks. In view of limited resources of the IoT devices, this paper proposes a lightweight and trustworthy device-to-server mutual authentication scheme for edge-enabled IoT networks. Initially, a trusted authority (TA) generates and assigns identities (IDs) and mask them to servers and clients, also known as member devices, in an off-line phase. These IDs are utilized to prevent possible infiltration of the adversary device(s). Next, every device ensures the authenticity of requesting devices using a sophisticated challenge, which is encrypted using a 128-bits secret key, λi. Each device expects a reply from the intended destination device for resolving the encrypted challenge within the defined time-frame, i.e.,△T. Moreover, authenticity of the requesting device is verified through the stored IDs which are shared in the off-line phase. Simulation results have verified the exceptional performance of the proposed authentication scheme against field proven approaches in terms of computational and communication costs, respectively.

Referensi

Dokumen terkait

Not to be confused with the FTC’s Privacy Framework, Commerce released its own privacy report , entitled “Commercial Data Privacy and Innovation in the Internet Economy: A

“Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework.” This Framework is “designed to protect privacy, transparency, and informed choice

To fill these two gaps; in the upcoming section, we will provide a framework to address the issues of privacy preservation, and energy optimization in 5G aided IIoT.. PRIVACY PROTECTION

Internet of Things or IoT are the devices with unique identifiers that share data or information over the internet whereas, Blockchain is a peer to peer network with a distributed

Table 1: Overall analysis of survey Authors Title Proposed Algorithms / Techniques Objective Limitations Journal Name Zhang, et al.[16] Ldc: A lightweight data

SAFE ROUTE PLANNERS 8 Table 3.1: A comparative analysis with existing safe route planners Problem Settings Privacy Efficiency Safety pSS Objective Level

A Survey on Information-Centric Networking with Cloud Internet of Things and Artificial Intelligence ABSTRACT The Internet is evolving, and data is a critical component of today's

"Information Fusion for 5G IoT: An Improved 3D Localisation Approach Using K-DNN and Multi-Layered Hybrid Radiomap", Electronics, 2023Publication "Next Generation of Internet of