S. T. Revathi, Gayathri A., Sathya A., Santhiya M.
{"title":"物联网应用中基于 ECC 的安全通信认证方法","authors":"S. T. Revathi, Gayathri A., Sathya A., Santhiya M.","doi":"10.58346/jisis.2023.i4.006","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) is an advanced applied science in recent years that enables communication among humans and smart components or among Internet-based components. Besides, IoT provides affiliation of physical and virtual elements that are fully controlled by different kinds of hardware, software, and interaction advancements. Though numerous methods of IoT offer many advantages to our day-to-day routine, it also possesses huge security weaknesses. The traditional methods are vulnerable to a huge range of attacks. Hence, establishing safe and effective security alternatives for the IoT environment remains as a main challenge and the major risk in this security solution is to transfer significant information in a secure manner. To address such limitations, an effective authentication approach named CHEK-based authentication methodology is devised for secure communication in IoT. The proposed authentication scheme consists of four steps and the authentication approach is developed by considering various security operations like hashing, encryption, secret key pairs, passwords, and so on. Moreover, the CHEK-based authentication scheme provides promising solution with minimum computational cost of 16.541 and minimum memory usage of 72.3MB.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"42 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECC based Authentication Approach for Secure Communication in IoT Application\",\"authors\":\"S. T. Revathi, Gayathri A., Sathya A., Santhiya M.\",\"doi\":\"10.58346/jisis.2023.i4.006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) is an advanced applied science in recent years that enables communication among humans and smart components or among Internet-based components. Besides, IoT provides affiliation of physical and virtual elements that are fully controlled by different kinds of hardware, software, and interaction advancements. Though numerous methods of IoT offer many advantages to our day-to-day routine, it also possesses huge security weaknesses. The traditional methods are vulnerable to a huge range of attacks. Hence, establishing safe and effective security alternatives for the IoT environment remains as a main challenge and the major risk in this security solution is to transfer significant information in a secure manner. To address such limitations, an effective authentication approach named CHEK-based authentication methodology is devised for secure communication in IoT. The proposed authentication scheme consists of four steps and the authentication approach is developed by considering various security operations like hashing, encryption, secret key pairs, passwords, and so on. Moreover, the CHEK-based authentication scheme provides promising solution with minimum computational cost of 16.541 and minimum memory usage of 72.3MB.\",\"PeriodicalId\":36718,\"journal\":{\"name\":\"Journal of Internet Services and Information Security\",\"volume\":\"42 9\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Internet Services and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58346/jisis.2023.i4.006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Internet Services and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jisis.2023.i4.006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
摘要
物联网(Internet of Things, IoT)是近年来发展起来的一门先进的应用科学,它能够实现人与智能组件之间或基于互联网的组件之间的通信。此外,物联网提供了物理和虚拟元素的从属关系,这些元素完全由不同类型的硬件,软件和交互进步控制。尽管物联网的许多方法为我们的日常工作提供了许多优势,但它也具有巨大的安全弱点。传统的方法容易受到各种各样的攻击。因此,为物联网环境建立安全有效的安全替代方案仍然是一项主要挑战,这种安全解决方案的主要风险是以安全的方式传输重要信息。为了解决这些限制,设计了一种有效的身份验证方法,称为基于check的身份验证方法,用于物联网中的安全通信。提出的身份验证方案由四个步骤组成,并且通过考虑各种安全操作(如散列、加密、秘密密钥对、密码等)来开发身份验证方法。此外,基于check的认证方案以最小的计算成本(16.541)和最小的内存使用(72.3MB)提供了有前途的解决方案。
ECC based Authentication Approach for Secure Communication in IoT Application
Internet of Things (IoT) is an advanced applied science in recent years that enables communication among humans and smart components or among Internet-based components. Besides, IoT provides affiliation of physical and virtual elements that are fully controlled by different kinds of hardware, software, and interaction advancements. Though numerous methods of IoT offer many advantages to our day-to-day routine, it also possesses huge security weaknesses. The traditional methods are vulnerable to a huge range of attacks. Hence, establishing safe and effective security alternatives for the IoT environment remains as a main challenge and the major risk in this security solution is to transfer significant information in a secure manner. To address such limitations, an effective authentication approach named CHEK-based authentication methodology is devised for secure communication in IoT. The proposed authentication scheme consists of four steps and the authentication approach is developed by considering various security operations like hashing, encryption, secret key pairs, passwords, and so on. Moreover, the CHEK-based authentication scheme provides promising solution with minimum computational cost of 16.541 and minimum memory usage of 72.3MB.