...
首页> 外文期刊>International journal of knowledge-based and intelligent engineering systems >Systematic investigation and performance study of authentication and authorization techniques of Internet of Things
【24h】

Systematic investigation and performance study of authentication and authorization techniques of Internet of Things

机译:物联网认证授权技术的系统研究与性能研究

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

At present, Internet of Things (IoT) finds valuable application in the field of smart cards, smart grid, and intelligent transportation. However, security is a major concern of these IoT networks and there is a possibility for the information drip in the network. Thus, the major concerns in IoT networks are secure authentication and data integrity such that authentication and authorization are the two major countermeasures in the security paradigm, which manages, controls, and communicates a device. Accordingly, a multi-level authentication was proposed based on the memory and machine attributes-based profiling and elliptic curve cryptography. Additionally, adaptive level of authorization was developed based on data importance and feedback. Thus, this paper deliberates a systematic study and investigation of the authentication and authorization protocol. For evaluating the robustness of the method, various attacks, such as Distributed Denial of Service (DDOS), Denial of Service (DOS), Man in Middle, Reply Attack, Server Spoofing attack, stolen verifier attack, and Impersonation attack, are considered. The simulation of the methods is done using these attacks, and the analysis is progressed based on detection rate and detection time. The comparative analysis reveals the effectiveness of the methods against various attacks, discussing the security and the detection time.
机译:目前,物联网(IoT)在智能卡,智能电网和智能交通领域中找到了有价值的应用。但是,安全性是这些物联网网络的主要关注点,并且网络中的信息可能会泄漏。因此,IoT网络中的主要问题是安全身份验证和数据完整性,因此身份验证和授权是安全范式中管理,控制和通信设备的两个主要对策。因此,基于内存和基于机器属性的配置文件以及椭圆曲线密码学,提出了一种多级身份验证。此外,根据数据的重要性和反馈来开发自适应级别的授权。因此,本文对身份验证和授权协议进行了系统的研究和调查。为了评估该方法的健壮性,考虑了各种攻击,例如分布式拒绝服务(DDOS),拒绝服务(DOS),中间人攻击,回复攻击,服务器欺骗攻击,验证者被盗和模拟攻击。使用这些攻击对方法进行了仿真,并根据检测率和检测时间进行了分析。对比分析揭示了该方法针对各种攻击的有效性,讨论了安全性和检测时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号