Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/3480
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSahoo, Asit-
dc.contributor.authorSahoo, Shreeya Swagatika-
dc.contributor.authorSahoo, Sampa-
dc.contributor.authorSahoo, Bibhudatta-
dc.contributor.authorTuruk, Ashok Kumar-
dc.date.accessioned2020-01-22T04:45:12Z-
dc.date.available2020-01-22T04:45:12Z-
dc.date.issued2020-12-
dc.identifier.citation12th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bengaluru, India, 7-11 January 2020en_US
dc.identifier.urihttp://hdl.handle.net/2080/3480-
dc.descriptionCopyright belongs to proceeding publisheren_US
dc.description.abstractWith the advancement in technology, the Internet of Things (IoT) systems has been blooming in leap and bounds. It aims at connecting things such as vehicles, hospitals, industries, and consumers through the Internet. The increase in a number of IoT devices and the heterogeneity of their network connection is increasing day by day; it has given rise to several challenges such as authenticity, cost and usability, scalability, interoperability, mobility, and many more. Interoperability is one of such security challenges which has the ability for systems or components to communicate with each other, regardless of their manufacturer or technical specifications. Further, security and privacy issue is also a significant concern in the IoT environment. So, the IoT system must be secured, and proper authentication schemes have to be integrated to restrain the unauthorized access. Besides, the limited computation capability of the sensor generates the need for the light-weight authentication protocol. In this regard, this paper discusses an interoperable light-weight authentication protocol for the IoT system. To demonstrate the feasibility of the scheme, we employed a widely used formal verification tool Proverif for correctness proof of the scheme. Additionally, informal security analysis demonstrates that the scheme is secure against most of the known attacks.en_US
dc.subjectAuthenticationen_US
dc.subjectECCen_US
dc.subjectIoTen_US
dc.subjectProverifen_US
dc.subjectProverifen_US
dc.titleAn Interoperable ECC based Authentication and Key Agreement Scheme for IoT Environmenten_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2020_COMSNETS_ASahoo_Interoperable.pdf3.2 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.