Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Weber RH (2010) Internet of Things-New security and privacy challenges. Souissi I, Azzouna NB, Said LB (2019) A multi-level study of information trust models in WSN-assisted IoT. Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. J King Saud Univ Comput Inf Sci 27(2):193–210 IEEE Internet of Things J 5(1):269–282ĭas AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic iot networks. Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A (2016) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Future Gener Comput Syst 78:1005–1019Ītzori L, Iera A, Morabito G (2010) The internet of things: a survey. J Netw Comput Appl 89:72–85Īmin R, Kumar N, Biswas GP, Iqbal R, Chang RV (2018) A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Wu F, Xu L, Kumari S, Li X, Shen J, Choo KKR, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. In: 2012 International Conference on Measurement, Information and Control (MIC), vol 1. Li L (2012) Study on security architecture in the Internet of Things. Jing Q, Vasilakos VA, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Henze M, Hermerschmidt L, Kerpen D, Häußling R, Rumpe B, Wehrle K (2016) A comprehensive approach to privacy in the cloud-based Internet of Things. Int J Electr Comput Energ Electron Commun Eng 6(12):1398–1401
![no limits 2 user id and key no limits 2 user id and key](https://usermanual.wiki/Document/SQLWorkbenchManual.155696416-User-Guide-Page-1.png)
A formal security analysis using AVISPA simulation tool has been done that confirms the proposed scheme is robust against relevant security threats.Īhmed MR, Huang X, Sharma D, Cui H (2012) Wireless sensor network: characteristics and architectures. Finally, the computation and communication overheads of the proposed scheme are compared with other existing protocols to confirm that the proposed scheme is lightweight. To support our claim, multiple cryptographic attacks are analyzed and found that the proposed scheme is not vulnerable to those attacks. In this research, we have proposed an ECC-based three-factor remote user authentication scheme that runs in the smart device and preserves privacy, and data confidentiality of the communicating user. To perform secure transmission of data between IoT network and remote user, mutual authentication, and session key negotiation play a key role.
![no limits 2 user id and key no limits 2 user id and key](https://present5.com/presentation/6b59495f6cd398f7ee6ce32f6ae8f385/image-86.jpg)
With the immense increment of usage of smart devices, IoT services become more accessible. Internet of things (IoT) has become a new era of communication technology for performing information exchange.