Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Certificate-Based Anonymous Device Access Control Scheme for IoT Environment

Authors
Malani, SauravSrinivas, JangiralaDas, Ashok KumarSrinathan, KannanJo, Minho
Issue Date
Dec-2019
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Automated validation of Internet security protocols and applications (AVISPAs); device access control; Internet of Things (IoT); key management; security
Citation
IEEE INTERNET OF THINGS JOURNAL, v.6, no.6, pp.9762 - 9773
Indexed
SCIE
SCOPUS
Journal Title
IEEE INTERNET OF THINGS JOURNAL
Volume
6
Number
6
Start Page
9762
End Page
9773
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/61338
DOI
10.1109/JIOT.2019.2931372
ISSN
2327-4662
Abstract
As the "Internet communications infrastructure" develops to encircle smart devices, it is very much essential for designing suitable methods for secure communications with these smart devices, in the future Internet of Things (IoT) applications context. Due to wireless communication among the IoT smart devices and the gateway node (GWN), several security threats may arise in the IoT environment, including replay, man-in-the-middle, impersonation, malicious devices deployment, and physical devices capture attacks. In this article, to mitigate such security threats, we design a new certificate-based device access control scheme in IoT environment which is not only secure against mentioned attacks, but it also preserves anonymity property. A detailed security analysis using the widely accepted real-or-random (ROR) model-based formal security analysis, informal security analysis, and also formal security verification based on the broadly accepted automated validation of Internet security protocols and applications (AVISPAs) tool has been performed on the proposed scheme to show that it is secure against various known attacks. In addition, a comprehensive comparative analysis among the proposed scheme and other relevant schemes shows that a better tradeoff among the security and functionality attributes, communication, and computational costs is achieved for the proposed scheme as compared to other schemes.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jo, Min ho photo

Jo, Min ho
Department of Computer and Information Science
Read more

Altmetrics

Total Views & Downloads

BROWSE