A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Publisher:
IEEE Computer Society
Publication Type:
Conference Proceeding
Citation:
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 205 - 211 (7)
Issue Date:
2014
Full metadata record
Files in This Item:
Filename Description Size
ThumbnailCamera-Ready_Paper370_Mian.pdfAccepted Manuscript1.45 MB
Adobe PDF
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital world. There are a lot of speculations and future forecasts about the Internet of Things devices. However, most of them are vendor specific and lack a unified standard, which renders their seamless integration and interoperable operations. Another major concern is the lack of security features in these devices and their corresponding products. Most of them are resource-starved and unable to support computationally complex and resource consuming secure algorithms. In this paper, we have proposed a lightweight mutual authentication scheme which validates the identities of the participating devices before engaging them in communication for the resource observation. Our scheme incurs less connection overhead and provides a robust defence solution to combat various types of attacks.
Please use this identifier to cite or link to this item: