An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things
- Authors
- Jang, Sunggyun; Lim, Ducsun; Kang, Jinyeong; Joe, Inwhee
- Issue Date
- Dec-2016
- Publisher
- SPRINGER
- Keywords
- Merkle Tree; Root Hash; MAC (Message Authentication Code); IoT (Internet of Things) security; Authentication
- Citation
- WIRELESS PERSONAL COMMUNICATIONS, v.91, no.4, pp.1681 - 1695
- Indexed
- SCIE
SCOPUS
- Journal Title
- WIRELESS PERSONAL COMMUNICATIONS
- Volume
- 91
- Number
- 4
- Start Page
- 1681
- End Page
- 1695
- URI
- https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/153432
- DOI
- 10.1007/s11277-016-3355-0
- ISSN
- 0929-6212
- Abstract
- Wireless network devices are used for the Internet of Things in a variety of applications, and although the IoT has many benefits, there are some security issues in this area. Hacking tools that are widely used in wireless communication enable the attacker to export the information stored in the device memory. Devices within the IoT should not allow this information to be accessed without an authentication. In this paper, we propose an efficient device authentication protocol without certification authority for the Internet of Things. Compared to the existing Constrained Application Protocol, the proposed protocol increases efficiency by minimizing the number of message exchanges. Since our protocol is based on a keyed hash algorithm, the Certificate of Authority is not required. Experimental results show that the proposed authentication protocol improves the security level and reduces the resource consumption of devices.
- Files in This Item
-
Go to Link
- Appears in
Collections - 서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.