Raheem, Ali, Lasebae, Aboubaker and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) A secure authentication protocol for IP-based wireless sensor communications using the Location/ID Split Protocol (LISP). In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 24-26 Sept 2014, Beijing, China.
Preview |
PDF
Raheem-etal-2014-A-secure-authentication-protocol-for-IP-based-wireless-sensor-communications.pdf - Accepted Version Download (2MB) | Preview |
Abstract
The future of the Internet of Things (IoT) involves a huge number of node devices such as wireless sensors that can communicate in a machine-to-machine pattern, where devices will be globally addressed and identified. As the number of connected devices increased, the burden on the network infrastructure and the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone increased as well. Recently, an IETF working group, along with the research group at Cisco, are working on a Locator/ID Separation Protocol as a routing architecture that provides new semantics for IP addressing, in order to simplify routing operations and improve scalability in the future of the Internet such as the IoT. In the light of the previous issue; this paper proposes an efficient security authentication and a key exchange scheme that is suited for Internet of things based on Locator/ID Separation protocol. The proposed protocol method meets practicability, simplicity, and strong notions of security. The protocol is verified using Automated Validation Internet Security Protocols and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and the achieved results showed that they do not have any security flaws.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISSN: | 2324-898X |
ISBN: | 9781479965137 |
Identifier: | 10.1109/TrustCom.2014.135 |
Page Range: | pp. 840-845 |
Identifier: | 10.1109/TrustCom.2014.135 |
Additional Information: | © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Keywords: | Internet, Authentication, Peer-to-peer computing, Wireless sensor networks, Routing protocols |
Subjects: | Computing > Systems > Computer networking Computing |
Depositing User: | Jonathan Loo |
Date Deposited: | 21 Jun 2017 15:37 |
Last Modified: | 04 Nov 2024 12:35 |
URI: | https://repository.uwl.ac.uk/id/eprint/3491 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |