2019
DOI: 10.26636/jtit.2019.134019
|View full text |Cite
|
Sign up to set email alerts
|

Multifactor Authentication and Key Management Protocol for WSN-assisted IoT Communication

Abstract: In this paper a novel multi-factor authentication protocol for IoT applications, relying on enhanced Rabinassisted elliptic curve cryptography, biometric features and time stamping methods, is developed. Furthermore, a fuzzy verification algorithm has been developed to perform receiverlevel user verification, making computation efficient in terms of computational overhead as well as latency. An NS2 simulation-based performance assessment has revealed that the multifactor authentication and key management models we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…They are using ProVerif in the security analysis and it show that that their protocol is secure against all the possible attacks. Furthermore, [6] addressed a comparable issue with WSN-aided IoT connectivity. By utilising improved Rabin assisted elliptic curve encryption, biometric characteristics, and time stamping techniques, they introduce a multifactor authentication and key management mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…They are using ProVerif in the security analysis and it show that that their protocol is secure against all the possible attacks. Furthermore, [6] addressed a comparable issue with WSN-aided IoT connectivity. By utilising improved Rabin assisted elliptic curve encryption, biometric characteristics, and time stamping techniques, they introduce a multifactor authentication and key management mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Using a combination of trust values in a cluster and fuzzy logic, the proposed solution was able to considerably increase security and prevent hostile or untrustworthy nodes from becoming the cluster head according to simulated results. Authors in [14] presented a key management scheme for flat networks and a hierarchical network in which the base station serves as the secure third party in charge of key distribution and network security management.…”
Section: Introductionmentioning
confidence: 99%