scholarly journals Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things

2019 ◽  
Vol 15 (9) ◽  
pp. 155014771987937 ◽  
Author(s):  
Binbin Yu ◽  
Hongtu Li

Home-based multi-sensor Internet of Things, as a typical application of Internet of Things, interconnects a variety of intelligent sensor devices and appliances to provide intelligent services to individuals in a ubiquitous way. As families become more and more intelligent, complex, and technology-dependent, there is less and less need for human intervention. Recently, many security attacks have shown that Internet home-based Internet of Things have become a vulnerable target, leading to personal privacy problems. For example, eavesdroppers can acquire the identity of specific devices or sensors through public channels, which is not secure, to infer individual public life in the home area network. Authentication is the essential portion of many secure systems processing of verifying and declaring identity. Before providing confidential information, home-based-Internet of Things service authenticates users and devices. The communication and processing capabilities of intelligent devices are limited. Therefore, in home-based Internet of Things, lightweight authentication and key agreement technology are very important to resist known attacks. This article proposes an anonymous authenticated key agreement protocol using pairing-based cryptography. The protocol proposed in this article provides lightweight computation and ensures the security of communication between home-based multi-sensor Internet of Things network and Internet network.

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 119387-119404 ◽  
Author(s):  
Kisung Park ◽  
Sungkee Noh ◽  
Hyunjin Lee ◽  
Ashok Kumar Das ◽  
Myeonghyun Kim ◽  
...  

2019 ◽  
Vol 11 (3) ◽  
pp. 57 ◽  
Author(s):  
Lorenzo Vangelista ◽  
Marco Centenaro

The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, and has the aim of describing a particularly interesting feature provided by the latest LoRaWAN™ specification—often neglected in the literature—i.e., the roaming capability between different operators of LoRaWAN™ networks, across the same country or even different countries. Recalling that LoRaWAN™ devices do not have a subscriber identification module (SIM) like cellular network terminals, at a first glance the implementation of roaming in LoRaWAN™ networks could seem intricate. The contribution of this paper consists in explaining the principles behind the implementation of a global LoRaWAN network, with particular focus on how to cope with the lack of the SIM in the architecture and how to realize roaming.


Journal ICTEE ◽  
2021 ◽  
Vol 2 (2) ◽  
pp. 20
Author(s):  
Tri Sakti ◽  
Imam Suharjo

AbstrakTechnological advances today are very developed, so it can help the community in monitoring home security. One example is offices or houses owned by themselves. In this research I am interested in doing research and development in the field of IoT where this research aims to build a system that can help homeowners to provide security at the door of the house during remote travel. With fingerprint system equipped with door monitoring using botTelegram this system itself is implemented with the concept of internet of things (IoT). In this study using the concept of internet of things implemented in the automatic door system using microcontroller that serves as a prototype regulator so that the prototype can run properly. In this system has an interface in the form of Telegram-based applications by utilizing BotTelegram that serves as a communication tool between users and the system. In this system, users can monitor the security of the door when traveling or at home. Based on the results of the study, it can be concluded that the system can run with a percentage of 85% where the system can open automatic doors with fingerprint configuration data that has been registered in the fingerprint module. Keywords: Internet of things, fingerprints, telegram bots, nodemcu, Door Security


Sign in / Sign up

Export Citation Format

Share Document