Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications
There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2023-05, Vol.130 (1), p.401-420 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the objects/things within a diverse ecosystem comprised of different types of devices/nodes, mainly called IoT Node. Compared with traditional networks, IoT provides higher scope to implement configuring proto-cols with scalable performance even in variable traffic and node mobility conditions. However, IoT poses various restrictions when it comes to implementing security policies. It does not adapt traditional complex cryptography-defined security protocol functions due to the bottleneck condition for energy and computational performance problems, which in longer runs affects the communication scenario. An efficient security mechanism is required to be designed to secure the communication between different objects/things with considerable preservation of data privacy in both local and global level of IoT. The study introduces a novel security framework, signature-based authentication schema, which enables a robust message authenticator to verify the message integrity during the data communication process by applying a signature scheme. The concept is modeled using mathematical computation to represent the core signature-based authentication scheme. The study outcome exhibits that the proposed system offers approximately 37.2% of reduced energy fluctuation and 56.3% reduced energy consumption compared with existing approaches over a large-scale IoT deployment test environment. |
---|---|
ISSN: | 0929-6212 1572-834X |
DOI: | 10.1007/s11277-023-10291-w |