2020
DOI: 10.1002/ett.3993
|View full text |Cite
|
Sign up to set email alerts
|

Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network

Abstract: Internet of Things (IoT) defines as internetworks of physical smart devices embedded with electronic software, sensors, actuators, and network connectivity. Due to an increase in the number of smart devices, objects, and appliances, the existing addressing schemes and security protocols cannot guaranty to perform well in all situations. The main requirement includes a unique secure unique addressing scheme that ensures data privacy and reliable communication in the IoT system. In this article, a secure session… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 60 publications
0
11
0
Order By: Relevance
“…For checking data freshness, generally, timestamps and random nonce are used in WSN that guarantees the data is not replayed by the attacker. 41,58 • DOS: In denial of service (DOS), an adversary tries to overload the server with false service requests which cause the exhaustion of resource of the system and consecutively ends up in unavailability of service to the legitimate users. 41,58 • Man in the middle attack: When an adversary covertly eavesdrops on the messages transmitted between two legal parties and in turn, the adversary becomes successful to alter the messages in such a way so that the legal parties believe that they are communicating with each other.…”
Section: Generalized Attack Typesmentioning
confidence: 99%
See 4 more Smart Citations
“…For checking data freshness, generally, timestamps and random nonce are used in WSN that guarantees the data is not replayed by the attacker. 41,58 • DOS: In denial of service (DOS), an adversary tries to overload the server with false service requests which cause the exhaustion of resource of the system and consecutively ends up in unavailability of service to the legitimate users. 41,58 • Man in the middle attack: When an adversary covertly eavesdrops on the messages transmitted between two legal parties and in turn, the adversary becomes successful to alter the messages in such a way so that the legal parties believe that they are communicating with each other.…”
Section: Generalized Attack Typesmentioning
confidence: 99%
“…Then this attack is termed as the man in the middle attack. 42,58 • Session key computation: Session key is negotiated in each session among communicating parties to exchange any message securely. It should be chosen in such a way that if any leak of the private parameter or the temporary parameter takes place, still the session key should remain safe that is, it should be impossible to calculate by the attacker.…”
Section: Generalized Attack Typesmentioning
confidence: 99%
See 3 more Smart Citations