W. R. Bezerra, R. N. Boing, Cristiano Antonio de Souza, Carlos Becker Westphall
{"title":"物联网受限设备和低功耗广域网CoAP多因素声誉认证机制实验","authors":"W. R. Bezerra, R. N. Boing, Cristiano Antonio de Souza, Carlos Becker Westphall","doi":"10.1109/ICOIN56518.2023.10048959","DOIUrl":null,"url":null,"abstract":"The security of constrained devices in Internet of Things presents itself as a challenge due to the limitation of existing resources. It is important to analyze appropriate security mechanisms for this resource-constrained environment, specifically for authentication. This study presents an experiment that analyzes a proposal for an original Constrained Application Protocol Multi-Factor Authentication with Reputation, in comparison to simple authentication and a reference with no authentication. From this experience it was possible to prove that multi-factor authentication with reputation is also an adequate solution for Low Power Wide Area Network and constrained devices and does not require much more resources than simple authentication. With this work it is possible to evaluate the adoption of Multi Factor Authentication with Reputation on Constrained Devices and to subsidize choices of Internet of Things projects with this type of configuration.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network\",\"authors\":\"W. R. Bezerra, R. N. Boing, Cristiano Antonio de Souza, Carlos Becker Westphall\",\"doi\":\"10.1109/ICOIN56518.2023.10048959\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of constrained devices in Internet of Things presents itself as a challenge due to the limitation of existing resources. It is important to analyze appropriate security mechanisms for this resource-constrained environment, specifically for authentication. This study presents an experiment that analyzes a proposal for an original Constrained Application Protocol Multi-Factor Authentication with Reputation, in comparison to simple authentication and a reference with no authentication. From this experience it was possible to prove that multi-factor authentication with reputation is also an adequate solution for Low Power Wide Area Network and constrained devices and does not require much more resources than simple authentication. With this work it is possible to evaluate the adoption of Multi Factor Authentication with Reputation on Constrained Devices and to subsidize choices of Internet of Things projects with this type of configuration.\",\"PeriodicalId\":285763,\"journal\":{\"name\":\"2023 International Conference on Information Networking (ICOIN)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Information Networking (ICOIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN56518.2023.10048959\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN56518.2023.10048959","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network
The security of constrained devices in Internet of Things presents itself as a challenge due to the limitation of existing resources. It is important to analyze appropriate security mechanisms for this resource-constrained environment, specifically for authentication. This study presents an experiment that analyzes a proposal for an original Constrained Application Protocol Multi-Factor Authentication with Reputation, in comparison to simple authentication and a reference with no authentication. From this experience it was possible to prove that multi-factor authentication with reputation is also an adequate solution for Low Power Wide Area Network and constrained devices and does not require much more resources than simple authentication. With this work it is possible to evaluate the adoption of Multi Factor Authentication with Reputation on Constrained Devices and to subsidize choices of Internet of Things projects with this type of configuration.