LAM-CIoT:Lightweightauthenticationmechanismincloud-basedIoT environmen

Wazid, Mohammed and Das, Ashok Kumar and Bhat, Vivekananda K and Vasilakos, Athanasios V (2020) LAM-CIoT:Lightweightauthenticationmechanismincloud-basedIoT environmen. Journal of Network and Computer Applications, 150. ISSN 1084-8045

[img] PDF
7854.pdf - Published Version
Restricted to Registered users only

Download (2MB) | Request a copy
Official URL: http://


Internet of Things (IoT)becomes a new era of the Internet, which consists of several connected physical smart objects (i.e.,sensing devices)through the Internet. IoT has different types of applications, such as smart home, wearable devices, smart connected vehicles, industries, and smart cities. Therefore, IoT based applications become the essential parts of our day-to-day life. In a cloud-based IoT environment, cloud platform is used to store the data accessed from the IoT sensors. Such an environment is greatly scalable and it supports real time event processing which is very important in several scenarios (i.e., IoT sensors based surveillance and monitoring). Since some applications incloud-based IoT are very critical, the information collected and sent by IoT sensors must not be leaked during the communication. To accord with this, we design a new lightweight authentication mechanism in cloud-based IoT environment, called LAM-C IoT. By using LAM-C IoT, an authenticated user can access the data of IoT sensors remotely. LAM-C IoT applies efficient “one-way crypto graphic hash functions” along with “bit wise XOR operations”. In addition, fuzzy extractor mechanism is also employed at the user’s end for local biometric verification. LAM-CIoT is methodically analyzed for its security part through the formal security using the broadly-accepted “Real-Or-Random (ROR)” model, formal security verification using the widely-used “Automated Validation of Internet Security Protocols and Applications (AVISPA)” tool as well as the informal security analysis.The performance analysis shows that LAM-C IoT offers better security, and low communication and computation over heads as compared to the closely related authentication schemes. Finally, LAM-CIoTisevaluatedusingtheNS2networksimulatorforthemeasurement of network performance parameters that envisions the impact of LAM-C IoT on the network performance of LAM-C IoT and other schemes.

Item Type: Article
Uncontrolled Keywords: InternetofThings(IoT) Cloudcomputing Authentication Keyagreement Security AVISPAsimulatio
Subjects: Engineering > MIT Manipal > Computer Science and Engineering
Depositing User: MIT Library
Date Deposited: 12 Feb 2020 10:56
Last Modified: 12 Feb 2020 10:56

Actions (login required)

View Item View Item