http://10.10.120.238:8080/xmlui/handle/123456789/509
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gupta A. | en_US |
dc.contributor.author | Tripathi M. | en_US |
dc.contributor.author | Shaikh T.J. | en_US |
dc.contributor.author | Sharma A. | en_US |
dc.date.accessioned | 2023-11-30T08:39:45Z | - |
dc.date.available | 2023-11-30T08:39:45Z | - |
dc.date.issued | 2019 | - |
dc.identifier.issn | 1389-1286 | - |
dc.identifier.other | EID(2-s2.0-85056888201) | - |
dc.identifier.uri | https://dx.doi.org/10.1016/j.comnet.2018.11.021 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/509 | - |
dc.description.abstract | The paradigm of the Internet of Things (IoT) is a system of interconnected objects that can be accessed globally with the help of the Internet. IoT has numerous applications including healthcare wherein the wearable devices can sense the data from the body of the patient and sent it to the concerned doctor for remote monitoring. It is essential that these devices should operate in real time and generate the precise data as life-critical decisions are made based upon the data received from these devices. The infrastructure of IoT is very heterogeneous and dynamic therefore vulnerable to the threat of security and privacy. One of the most significant challenges in IoT is the authentication of the devices before sending the data so that we can have confidence in the received data. As IoT devices are resource constraint, there is a need for lightweight authentication scheme for them. In this paper, we introduce a new authentication technique for communication on the Internet of Things (IoT) using simple XOR and one-way Cryptographic hash function. The proposed protocol not only provides security but also maintains equilibrium between the efficiency and communication cost. The security of the proposed protocol is evaluated using BAN-Logic, the widely accepted AVISPA tool and the informal security analysis. Then, the comparison of the proposed protocol with the existing related schemes is shown concerning security features, communication, and computational cost. © 2018 Elsevier B.V. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier B.V. | en_US |
dc.source | Computer Networks | en_US |
dc.subject | AVISPA | en_US |
dc.subject | BAN-Logic | en_US |
dc.subject | Internet of things | en_US |
dc.subject | Key establishment | en_US |
dc.subject | Mutual authentication | en_US |
dc.subject | Wearable devices | en_US |
dc.title | A lightweight anonymous user authentication and key establishment scheme for wearable devices | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Journal Article |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.