An Efficient Authentication Scheme for Internet of Things

Jaafer Saraireh(1*), Haya Joudeh(2)
(1) 
(2) 
(*) Corresponding Author
DOI : 10.54039/ijcnis.v13i3.3422

Abstract

The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. “Things” have the ability to communicate, generate, transmit and store data over the network connection. During each communication between “Things”, the data transmitted is potentially vulnerable to malicious attacks, loss, distortions and interruption which impair functionality, system efficiency and user satisfaction. Additionally, inappropriate user controls can cause problems in IoT services, such as granting anonymous users access to personal resources and enable legitimate users to access resources in an illegal manner or preventing legitimate users to access resources in an authorized manner. Therefore, communications between things need to be authenticated, authorized, secured and ensured to have high privacy by applying a strong authentication protocol.

The aim of this research is to enhance the authentication protocol, starting by reducing the heavy use of storage in “Things”, and eliminating unnecessary messages during authentication steps, taking into consideration the network security analysis. This research represents a security performance analysis and enhancement authentication for the IoT. The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area compared with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.

Article Statistic

Abstract view : 50 times
PDF views : 17 times

How To Cite This :

Refbacks

  • There are currently no refbacks.


International Journal of Communication Networks and Information Security (IJCNIS)               ISSN: 2073-607X (Online)