2018
DOI: 10.3844/jcssp.2018.1401.1411
|View full text |Cite
|
Sign up to set email alerts
|

TPAL: A Protocol for Node Authentication in IoT

Abstract: Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated before it can deliver any data packet. Even though LLN uses an Internet connection, current authentication for Internet protocols cannot be adopted directly into LLN … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Once the secret keys of the network are exposed to the network attackers, the cryptographic systems will no longer be able to protect the network [23][24]. As mentioned, research shows that RPL has experienced significant vulnerabilities, so improvements in security mechanisms and the RPL routing protocol authentication system are essential [25][26]. The routing protocol requires mechanisms for identifying inconsistencies, loop avoidance, validation, and detecting inconsistencies.…”
Section: Pre-installed Modementioning
confidence: 99%
“…Once the secret keys of the network are exposed to the network attackers, the cryptographic systems will no longer be able to protect the network [23][24]. As mentioned, research shows that RPL has experienced significant vulnerabilities, so improvements in security mechanisms and the RPL routing protocol authentication system are essential [25][26]. The routing protocol requires mechanisms for identifying inconsistencies, loop avoidance, validation, and detecting inconsistencies.…”
Section: Pre-installed Modementioning
confidence: 99%
“…In this part, the performance related to the computational cost, communication costs, and security properties of the SLEACH-PRO are examined and compared with the most relevant recent schemes [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Table 5 lists the computational cost notations and the execution time for each cryptographic operation [ 33 ].…”
Section: Analysis Of Performancementioning
confidence: 99%
“…As seen in Table 6 , the SLEACH-PRO protocol has the lowest computational cost compared to [ 22 , 23 , 24 , 26 , 27 , 28 , 29 , 31 , 32 ]. In [ 22 ], two keys are pre-loaded on each sensor node (SN): the master key is used exclusively by the CH to communicate with it, and the BS key is used to communicate with SN.…”
Section: Analysis Of Performancementioning
confidence: 99%
See 1 more Smart Citation