{"title":"面向物联网(IoT)身份验证的强认证协议","authors":"H. Dalkılıç, M. H. Özcanhan","doi":"10.1109/UBMK52708.2021.9559010","DOIUrl":null,"url":null,"abstract":"The use of Internet of things (IoT) devices in smart cities has been increasing in recent years. The use of IoT devices, which facilitate the daily life of people living in the smart city, on wearable and mobile devices causes the vulnerability. Some countermeasures should be taken to prevent unauthorized access to IoT devices that contain personal data and to protect the data. In this study, the protocol created to ensure the security of the data communication of IoT devices in smart cities is explained. In the proposed design, IoT device-based secure data communication protocol with limited resources is presented. Data privacy methods that will work on IoT devices are designed to achieve high performance by consuming as few resources as possible. The proposed protocol provides secure data communication against 4 different attacks: Man-in-the-middle attack, malicious code injection attack, denial of service (DoS) attack, and replay attack. As a result of the formal analysis made with the Scyther tool, it is shown that data security is ensured.","PeriodicalId":106516,"journal":{"name":"2021 6th International Conference on Computer Science and Engineering (UBMK)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Strong Authentication Protocol for Identity Verification in Internet of Things (IoT)\",\"authors\":\"H. Dalkılıç, M. H. Özcanhan\",\"doi\":\"10.1109/UBMK52708.2021.9559010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of Internet of things (IoT) devices in smart cities has been increasing in recent years. The use of IoT devices, which facilitate the daily life of people living in the smart city, on wearable and mobile devices causes the vulnerability. Some countermeasures should be taken to prevent unauthorized access to IoT devices that contain personal data and to protect the data. In this study, the protocol created to ensure the security of the data communication of IoT devices in smart cities is explained. In the proposed design, IoT device-based secure data communication protocol with limited resources is presented. Data privacy methods that will work on IoT devices are designed to achieve high performance by consuming as few resources as possible. The proposed protocol provides secure data communication against 4 different attacks: Man-in-the-middle attack, malicious code injection attack, denial of service (DoS) attack, and replay attack. As a result of the formal analysis made with the Scyther tool, it is shown that data security is ensured.\",\"PeriodicalId\":106516,\"journal\":{\"name\":\"2021 6th International Conference on Computer Science and Engineering (UBMK)\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 6th International Conference on Computer Science and Engineering (UBMK)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UBMK52708.2021.9559010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Computer Science and Engineering (UBMK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UBMK52708.2021.9559010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strong Authentication Protocol for Identity Verification in Internet of Things (IoT)
The use of Internet of things (IoT) devices in smart cities has been increasing in recent years. The use of IoT devices, which facilitate the daily life of people living in the smart city, on wearable and mobile devices causes the vulnerability. Some countermeasures should be taken to prevent unauthorized access to IoT devices that contain personal data and to protect the data. In this study, the protocol created to ensure the security of the data communication of IoT devices in smart cities is explained. In the proposed design, IoT device-based secure data communication protocol with limited resources is presented. Data privacy methods that will work on IoT devices are designed to achieve high performance by consuming as few resources as possible. The proposed protocol provides secure data communication against 4 different attacks: Man-in-the-middle attack, malicious code injection attack, denial of service (DoS) attack, and replay attack. As a result of the formal analysis made with the Scyther tool, it is shown that data security is ensured.