{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T05:31:14Z","timestamp":1705037474399},"reference-count":24,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"abstract":"

Internet of things can be defined as collection of different physical that can converse with each other without any interruption. The IoT applications have the capability to change the current scenario of various domains such as health service, agriculture, and so on by offering services that can offer luxury to human life and also increases effectiveness. IoT follows open framework. Because of that it presents an opportunity to adversary for easily targeting system by performing various cyber-attacks. Existing well known cryptography solutions cannot be implemented in IoT as it has limitations in terms of resource ownership and also storage capacity. The authors have designed an efficient and secure multi-factor IoT authentication algorithm that is lightweight and provides the protection against different security threats such as MITM, replay, and location spoofing threat. Suggested work is tested on the tool AVISPA for the security validation. Communication and computational cost is low for the suggested work in comparison with the existing work.<\/p>","DOI":"10.4018\/ijossp.310939","type":"journal-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T21:35:46Z","timestamp":1665092146000},"page":"1-15","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach"],"prefix":"10.4018","volume":"13","author":[{"given":"Mihir","family":"Mehta","sequence":"first","affiliation":[{"name":"Gujarat Technological University, India"}]},{"given":"Kajal","family":"Patel","sequence":"additional","affiliation":[{"name":"Vishwakarma Government Engineering College, India"}]}],"member":"2432","reference":[{"key":"IJOSSP.310939-0","doi-asserted-by":"crossref","first-page":"3663","DOI":"10.3390\/s19173663","article-title":"An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things.","volume":"19","author":"A. A.Ahmed","year":"2019","journal-title":"Sensors (Basel)"},{"key":"IJOSSP.310939-1","doi-asserted-by":"crossref","first-page":"1950","DOI":"10.3390\/s150819560","article-title":"Secure and Authenticated Data Communication in Wireless Sensor Networks.","volume":"15","author":"O.Alfandi","year":"2015","journal-title":"Sensors (Basel)"},{"key":"IJOSSP.310939-2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEM.2018.8536261"},{"key":"IJOSSP.310939-3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2880225"},{"key":"IJOSSP.310939-4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882610"},{"key":"IJOSSP.310939-5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2141038"},{"key":"IJOSSP.310939-6","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., & Vidhate, A. (2017). Security Attacks in IoT: A Survey. IEEE International conference on I-SMAC, Pallkad, India.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"IJOSSP.310939-7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073822"},{"key":"IJOSSP.310939-8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846299"},{"key":"IJOSSP.310939-9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"IJOSSP.310939-10","first-page":"1","article-title":"Effectively Collecting Data for the Location-Based Authentication in Internet of Things.","volume":"1","author":"Y.Kawamoto","year":"2015","journal-title":"IEEE Systems Journal"},{"key":"IJOSSP.310939-11","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680960"},{"key":"IJOSSP.310939-12","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAC.2017.8058318"},{"key":"IJOSSP.310939-13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947723"},{"key":"IJOSSP.310939-14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875472"},{"key":"IJOSSP.310939-15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910848"},{"key":"IJOSSP.310939-16","doi-asserted-by":"crossref","unstructured":"Noor & Hassan. (2019). Current research on Internet of Things (IoT) security: A survey. Computer Networks, 148, 283-294.","DOI":"10.1016\/j.comnet.2018.11.025"},{"issue":"19","key":"IJOSSP.310939-17","doi-asserted-by":"crossref","first-page":"4312","DOI":"10.3390\/s19194312","article-title":"PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices.","volume":"19","author":"D. A. F.Saraiva","year":"2019","journal-title":"Sensors (Basel)"},{"key":"IJOSSP.310939-18","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.032501741"},{"key":"IJOSSP.310939-19","doi-asserted-by":"crossref","first-page":"97267","DOI":"10.1109\/ACCESS.2020.2996264","article-title":"Security Enhancement on a Light Weight Authentication Scheme with Anonymity Fog Computing Architecture.","volume":"8","author":"L.Wang","year":"2020","journal-title":"IEEE Access: Practical Innovations, Open Solutions"},{"key":"IJOSSP.310939-20","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2690437"},{"key":"IJOSSP.310939-21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"IJOSSP.310939-22","doi-asserted-by":"crossref","unstructured":"Zhao, Y. (2018). Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment. WILEY Hindawai Security and Communication Networks.","DOI":"10.1155\/2018\/9178941"},{"key":"IJOSSP.310939-23","doi-asserted-by":"publisher","DOI":"10.1109\/DCABES.2017.32"}],"container-title":["International Journal of Open Source Software and Processes"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=310939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T23:00:21Z","timestamp":1673910021000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJOSSP.310939"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijossp.310939","relation":{},"ISSN":["1942-3926","1942-3934"],"issn-type":[{"value":"1942-3926","type":"print"},{"value":"1942-3934","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,6]]}}}