2022, Vol. 3, Issue 1, Part A
Lightweight authentication protocol for resource constrained M2M service Provisoning in IoT
Author(s): Mounika S and Nameet Kumar
Abstract: There has been significant development in the IoT field in the years after its inception. Everyday objects all around us may be used as Internet of Things (IoT) devices to collect data. We can see IoT implementation wherever we go. The broad use, however, has brought with it a number of security concerns. By a secure password-based authentication mechanism, we want to mitigate the effects of security flaws in the IoT setup in this project. We carried out the authentication and built four distinct protocols between the nodes in the network. We used the symmetric technique for encryption and decryption. Because of this, less effort and materials are needed to generate and maintain keys. Mobile devices, M2M service provider (MSP), sensors, and a gateway are the four components that make up our system. In this study, we provide the results of implementing four distinct authentication systems. The first protocol establishes trust between portable terminals and a central hub. The second protocol establishes trust between portable terminals and the sensor via mutual authentication. Thirdly, authentication between sensors and the gateway is provided by this protocol. The fourth protocol allows for authentication to take place directly between sensors, bypassing the gateway entirely. The testing results supported the suggested system's premise of decreased calculation time and cost.
DOI: 10.22271/27074544.2022.v3.i1a.44Pages: 15-21 | Views: 292 | Downloads: 102Download Full Article: Click Here
How to cite this article:
Mounika S, Nameet Kumar.
Lightweight authentication protocol for resource constrained M2M service Provisoning in IoT. Int J Mach Tools Maint Eng 2022;3(1):15-21. DOI:
10.22271/27074544.2022.v3.i1a.44