作者
Shailja Dahiya, Manoj Kumar Bohra
发表日期
2017/10/13
图书
Proceedings of the 10th International Conference on Security of Information and Networks
页码范围
59-64
简介
The authentication procedures are being utilized among the various Network & Communication Systems across the globe, which includes the healthcare networks, wireless sensor networks, Wi-Fi, etc. In the case of IoT networks, the small computational powered nodes are utilized as IoT sensors. The lower computational power creates the major hurdle in the implementation of security algorithms in the IoT node framework. A strong need of robust authentication mechanism with low resource requirement needs be developed to ensure the security of IoT networks. In this paper, the new authentication scheme is proposed over 6-column key table. The complex authentication keys are produced from the selective columns by using the combination of trigonometric functions. This model is created to protect data privacy against the Man-in-the-Middle (MITM) attacks over the IoT networks. The proposed model is designed …
引用总数
20182019202020212022212
学术搜索中的文章
S Dahiya, MK Bohra - Proceedings of the 10th International Conference on …, 2017