A robust authentication scheme for observing resources in the internet of things environment

Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

36 Citations (Scopus)

Abstract

The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital world. There are a lot of speculations and future forecasts about the Internet of Things devices. However, most of them are vendor specific and lack a unified standard, which renders their seamless integration and interoperable operations. Another major concern is the lack of security features in these devices and their corresponding products. Most of them are resource-starved and unable to support computationally complex and resource consuming secure algorithms. In this paper, we have proposed a lightweight mutual authentication scheme which validates the identities of the participating devices before engaging them in communication for the resource observation. Our scheme incurs less connection overhead and provides a robust defence solution to combat various types of attacks.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
Subtitle of host publicationTrustCom 2014
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages205-211
Number of pages7
ISBN (Electronic)9781479965137
ISBN (Print)9781479965144
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 - Beijing, China
Duration: 24 Sep 201426 Sep 2014

Other

Other13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
CountryChina
CityBeijing
Period24/09/1426/09/14

Keywords

  • Authentication
  • CoAP
  • Conditional option
  • Internet of things (IoT)
  • Resource observation

Fingerprint Dive into the research topics of 'A robust authentication scheme for observing resources in the internet of things environment'. Together they form a unique fingerprint.

  • Cite this

    Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014). A robust authentication scheme for observing resources in the internet of things environment. In Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2014 (pp. 205-211). [7011252] Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/TrustCom.2014.31