scholarly journals MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things

2021 ◽  
Vol 13 (6) ◽  
pp. 19-39
Author(s):  
Padmashree M G ◽  
Mallikarjun J P ◽  
Arunalatha J S ◽  
Venugopal K R

The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.

2017 ◽  
Vol 10 (2) ◽  
pp. 241-256 ◽  
Author(s):  
Vivek V. Jog ◽  
Senthil Murugan T.

Purpose Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks. Design/methodology/approach In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Findings DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack. Originality/value This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


internet of things is now everywhere and even if people are aware of it or not, it is part of our everyday life. For something that is so much in pace with our life, iot collects a lot of information about our day today life, which in case of a data leak or hijacking could lead to catastrophic effects in the society. Still iot devices are not manufactured keeping in mind the security factor. This paper dives into the problem of spoofing attacks dealt by iot devices and comes up with an authentication mechanism, which uses variants of elliptic curve cryptography to protect against such said attacks without exhausting the devices in case of computational power and storage area. The experimentation clearly revealed the strength of the scheme to mitigate spoofing attacks on the iot home networks.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2020 ◽  
Vol 6 (Supplement_1) ◽  
pp. 58-58
Author(s):  
Lamech Sigu ◽  
Fredrick Chite ◽  
Emma Achieng ◽  
Andrew Koech

PURPOSE The Internet of Things (IoT) is a technology that involves all things connected to the Internet that share data over a network without requiring human-to-human interaction or human-to-computer interaction. Information collected from IoT devices can help physicians identify the best treatment process for patients and reach accurate and expected outcomes. METHODS The International Cancer Institute is partnering to set up remote oncology clinics in sub-Saharan Africa. Medical oncologists and expert teams from across the world connect with oncology clinics in other Kenyan counties—Kisumu, Meru, Makueni, Garissa, Kakamega, Bungoma, Siaya, and Vihiga counties. The furthest county is Garissa, approximately 651.1 km from Eldoret, and the nearest is Vihiga at 100.4 km from Eldoret. This study began July 2019, and as of November 30th, the team has hosted 21 sessions with an average of 11 participants attending a session led by a medical oncologist. RESULTS IoT devices have become a way by which a patient gets all the information he or she needs from a physician without going to the clinic. Patient monitoring can be done in real time, allowing access to real-time information with improved patient treatment outcomes and a decrease in cost. Through IoT-enabled devices, the International Cancer Institute has set up weekly virtual tumor boards during which cancer cases are presented and discussed by all participating counties. An online training module on cancer is also offered. Furthermore, remote monitoring of a patient’s health helps to reduce the length of hospital stay and prevents readmissions. CONCLUSION In our setting, which has a few oncologists, use of IoT and tumor boards has helped to improve patient decision support as well as training for general physicians.


2016 ◽  
Vol 10 (14) ◽  
pp. 1795-1802 ◽  
Author(s):  
Debiao He ◽  
Lina Wang ◽  
Huaqun Wang ◽  
Muhammad Khurram Khan

2020 ◽  
Vol 1 (1-2) ◽  
pp. 27-37
Author(s):  
Stefan Hessel ◽  
Andreas Rebmann

Abstract IoT devices are omnipresent in children‘s rooms. At the same time these devices and their infrastructure have become notorious for security flaws. The following paper analyses current and future legal reglementation and IT security measures to protect children as an especially vulnerable group.


Sign in / Sign up

Export Citation Format

Share Document