Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach | IGI Global Scientific Publishing
Reference Hub1
Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach

Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach

Mihir Mehta, Kajal Patel
Copyright: © 2022 |Volume: 13 |Issue: 1 |Pages: 15
ISSN: 1942-3926|EISSN: 1942-3934|EISBN13: 9781683180975|DOI: 10.4018/IJOSSP.310939
Cite Article Cite Article

MLA

Mehta, Mihir, and Kajal Patel. "Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach." IJOSSP vol.13, no.1 2022: pp.1-15. https://doi.org/10.4018/IJOSSP.310939

APA

Mehta, M. & Patel, K. (2022). Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach. International Journal of Open Source Software and Processes (IJOSSP), 13(1), 1-15. https://doi.org/10.4018/IJOSSP.310939

Chicago

Mehta, Mihir, and Kajal Patel. "Dynamic Key-Based and Context-Aware Internet of Things Authentication Approach," International Journal of Open Source Software and Processes (IJOSSP) 13, no.1: 1-15. https://doi.org/10.4018/IJOSSP.310939

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet of things can be defined as collection of different physical that can converse with each other without any interruption. The IoT applications have the capability to change the current scenario of various domains such as health service, agriculture, and so on by offering services that can offer luxury to human life and also increases effectiveness. IoT follows open framework. Because of that it presents an opportunity to adversary for easily targeting system by performing various cyber-attacks. Existing well known cryptography solutions cannot be implemented in IoT as it has limitations in terms of resource ownership and also storage capacity. The authors have designed an efficient and secure multi-factor IoT authentication algorithm that is lightweight and provides the protection against different security threats such as MITM, replay, and location spoofing threat. Suggested work is tested on the tool AVISPA for the security validation. Communication and computational cost is low for the suggested work in comparison with the existing work.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global Scientific Publishing bookstore.