Veuillez utiliser cette adresse pour citer ce document : http://dspace.cu-barika.dz/jspui/handle/123456789/801
Titre: Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme
Auteur(s): BENTAHAR, Atef
Meraoumia, Abdallah
Mots-clés: Internet of Things
Sensing as a service
Key agreement
Fuzzy extractor
Elliptic curve Diffie-Hellman
Biometric cryptosystem
AVISPA
Date de publication: 24-jui-2021
Editeur: Journal of King Saud University - Computer and Information Sciences
Résumé: Internet of Things (IoT) sensing capabilities are now available as a public service. This new model, called sensing as a service (S2aaS), allows data owners to sell and/or exchange data with consumers interested in large open markets. However, the openness of the service industry makes the IoT-based S2aaS model more susceptible to malicious attacks. In this article, we propose a simple, efficient, and secure key agreement scheme for IoT-based S2aaS model. Users in the proposed system can securely and quickly access public services through a simple website rather than a traditional smart card. To simulate a real S2aaS environment, the cloud is treated as an untrusted node in the proposed method, and not all channels are secure. The fuzzy extractor and elliptic-curve Diffie–Hellman algorithms are used in conjunction with symmetric encryption and hash functions to establish a secure key agreement and data exchange session. In critical and frequent intervals, heavy processes are avoided. The proposed scheme’s security has been informally analyzed and formally proven using the Automated Validation of Internet Security Protocols and Applications tool. The results show that our scheme satisfies the security requirements.
URI/URL: http://dspace.cu-barika.dz/jspui/handle/123456789/801
Collection(s) :Department of Informatics - قسم اﻹعلام اﻵلي

Fichier(s) constituant ce document :
Fichier Description TailleFormat 
Sensing as a service in Internet of Things.pdfSensing as a service in Internet of Things: Efficient authentication and key agreement scheme96,82 kBAdobe PDFVoir/Ouvrir


Tous les documents dans DSpace sont protégés par copyright, avec tous droits réservés.