Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3661638.3661687acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaisnsConference Proceedingsconference-collections
research-article

Design of Efficient Device Communication Authentication Protocol in Large-scale Internet of Things Scenarios

Published: 01 June 2024 Publication History

Abstract

The conventional high-efficiency equipment communication authentication protocol is mainly based on the requirements of mobile services. The running time of the protocol is relatively short, and the tag storage consumption increases accordingly, which affects the security of communication authentication. Therefore, an efficient device communication authentication protocol in large-scale Internet of Things scenario is designed. Unify the format of efficient equipment communication authentication protocol, and unify the format of communication authentication protocol such as header, message type, serial number, data length, data and hash value to ensure the reliable transmission of protocol data. Authenticate the identity information of communication nodes of efficient devices in large-scale Internet of Things scenes, connect the Internet of Things nodes and terminals with the communication authentication center, and store the authentication fields after the bidirectional identity information authentication is completed, thus ensuring the effectiveness of the communication authentication protocol. The comparative experiments show that the protocol is more secure and can be applied in real life.

References

[1]
Benmammar, B. 2021. Internet of things and cognitive radio: Motivations and challenges. International Journal of Organizational and Collective Intelligence (IJOCI), 11(1), 39-52.
[2]
Rahmani, R., & Firouzi, R. 2021. Gateway controller with deep sensing: learning to be autonomic in intelligent internet of things. International Journal of Communication Networks and Distributed Systems, 26(1), 1-29.
[3]
Jagadish D, Vijay. T K, Prasad D M, 2021.FUTURISTIC VIEW OF INTERNET OF THINGS AND APPLICATIONS WITH PROSPECTIVE SCOPE.International Journal of Research,8(2):295-302.
[4]
Guo, Y., Zhao, Z., He, K., Lai, S., Xia, J., & Fan, L. 2021. Efficient and flexible management for industrial internet of things: A federated learning approach. Computer Networks, 192, 108122.
[5]
Kassab, M., Nithya, V., & Mokyed, M. S. 2021, July. HNS Advanced Encryption Standard: An Enhanced Security Approach for IoT Communication. In Journal of Physics: Conference Series (Vol. 1964, No. 6, p. 062015). IOP Publishing.
[6]
Tang, X., Gao, F., Ji, Y., & Wang, S. 2021. Research on Consistency of IoT Data Communication Based on Eigenvector Vector. In Journal of Physics: Conference Series (Vol. 1748, No. 3, p. 032063). IOP Publishing.
[7]
Samyuel, N. B., & Shimray, B. A. 2021. Securing IoT device communication against network flow attacks with Recursive Internetworking Architecture (RINA). ICT Express, 7(1), 110-114.
[8]
Xu, J., Miao, Y., & Zheng, X. 2021. Design and implementation of indoor positioning performance test system for IoT intelligent communication terminal. In Journal of Physics: Conference Series (Vol. 1732, No. 1, p. 012030). IOP Publishing.
[9]
Baniata, M., Reda, H. T., Chilamkurti, N., & Abuadbba, A. 2021. Energy-efficient hybrid routing protocol for IoT communication systems in 5G and beyond. Sensors, 21(2), 537.
[10]
Sabban, A. 2021. Ultra-wideband systems with energy harvesting units for sensors, 5G, IoT and medical systems. Journal of Sensor Technology, 11(01), 1.
[11]
Truong, H. L. 2021. Using IoTCloudSamples as a software framework for simulations of edge computing scenarios. Internet of Things, 14, 100383.
[12]
Wang, S., Gomez, K., Sithamparanathan, K., Asghar, M. R., Russello, G., & Zanna, P. 2021. Mitigating ddos attacks in sdn-based iot networks leveraging secure control and data plane algorithm. Applied Sciences, 11(3), 929.
[13]
Wang, X., Wang, X., & Li, Y. 2021. NDN-based IoT with edge computing. Future Generation Computer Systems, 115, 397-405.
[14]
Jurado Perez, L., & Salvachúa, J. 2021. Simulation of scalability in cloud-based iot reactive systems leveraged on a wsan simulator and cloud computing technologies. Applied Sciences, 11(4), 1804.
[15]
Feng, L., Liu, Y., Guo, J., & Chen, Y. 2021. Predicting impact of Hitchhike on coexisted heterogeneous IoT networks. Applied Soft Computing, 110, 107741.
[16]
Sharma, S., & Kapoor, A. 2021. An efficient routing algorithm for IoT using GWO approach. International Journal of Applied Metaheuristic Computing (IJAMC), 12(2), 67-84.
[17]
Khalil, U., Ahmad, A., Abdel-Aty, A. H., Elhoseny, M., El-Soud, M. W. A., & Zeshan, F. 2021. Identification of trusted IoT devices for secure delegation. Computers & Electrical Engineering, 90, 106988.
[18]
Melia, S., Nasabeh, S., Lujan-Mora, S., & Cachero, C. 2021. MoSIoT: modeling and simulating IoT healthcare-monitoring systems for people with disabilities. International Journal of Environmental Research and Public Health, 18(12), 6357.
[19]
Pirson, T., & Bol, D. 2021. Assessing the embodied carbon footprint of IoT edge devices with a bottom-up life-cycle approach. Journal of Cleaner Production, 322, 128966.
[20]
Chen, H., Hou, L., Zhang, G. K., & Moon, S. 2021. Development of BIM, IoT and AR/VR technologies for fire safety and upskilling. Automation in Construction, 125, 103631.
[21]
Dong, J., Guan, Z., Wu, L., Du, X., & Guizani, M. 2021. A sentence-level text adversarial attack algorithm against IIoT based smart grid. Computer Networks, 190, 107956.
[22]
Saeed, S. A., Khan, F. Z., Iqbal, Z., Alroobaea, R., Ahmad, M., Talha, M., ... & Ali, I. 2021. An IoT-Based Network for Smart Urbanization. Wireless Communications and Mobile Computing, 2021, 1-14.

Index Terms

  1. Design of Efficient Device Communication Authentication Protocol in Large-scale Internet of Things Scenarios

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AISNS '23: Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security
    December 2023
    467 pages
    ISBN:9798400716966
    DOI:10.1145/3661638
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AISNS 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 10
      Total Downloads
    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media