Abstract
With the massive expansion of computing technology, the distributed architecture has received wide acceptance for their services. Moreover, IOT technology is used to develop smart applications such as smart security system, health care, smart medicals and smart houses. Due to the vibrant character of access and connectivity in IOT environment, there is mounting of risks and genesis of enormous threat to IOT environment. In proposed system, we have study the fundamental concept behind DASS approach and how to ensure strong authentication services in a distributed environment which will create snag for malicious user. Authentication is particularly a challenging issue in distributed environment due to its multi-sharing concept. DASS works on mutual authentication mechanism when two parties made conversation neither obtain any facts that it could employ to masquerade as the others to an arbiter. Finally, our work is to design the two-level security mechanisms for generating complex security system. In our propose system, work is implemented in two phases, whereas in first phase, we have used authentication process including password and signature for both ends using third party and in second phase data confidentiality using LOKI91 cryptography which is defensive from any differential cryptanalysis and enforcing the secure communication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sravani, Wazid, Ashok, Neeraj (2016) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE, pp 1–16
Sain M, Kang Y, Lee H (2017) Survey on security in Internet of Things: state of the art and challenges. ICACT, pp 1–6
Huh S, Cho S, Kim S (2017) Managing IoT devices using blockchain platform. ICACT, pp 1–4
Fatima B, Abdelhamid B (2017) Risk analysis in Internet of Things using EBIOS. IEEE, pp 1–7
Majeed A (2017) Internet of Things (IoT): a verification framework. IEEE, pp 1–3
Abels T, Khanna R, Midkiff K (2017) Future proof IoT: composable semantics, security, QoS and reliability. IEEE, pp 1–4
El-Maliki T, Seigneur J-M (2016) Efficient security adaptation framework for Internet of Things. IEEE, pp 1–6
Mohsin M, Anwar Z (2016) IoTSAT: a formal framework for security analysis of the Internet of Things (IoT). IEEE, pp 1–9
Baldini G, Le F (2015) Security certification and labelling in Internet of Things. ICT, pp 1–6
Nawir M, Amir A, Yaakob N (2016) Internet of Things (IoT): taxonomy of security attacks. ICED, Thailand, pp 1–6
Sklavos N, Zaharakis D (2016) Cryptography and security in Internet of Things (IoTs): models, schemes, and implementations. IEEE, pp 1–2
Metongnon L, Ezin E, Sadre R (2017) Efficient probing of heterogeneous IoT networks. IFIP, pp 1–7
Abderrahim O, Housine M (2017) CTMS-SIOT: a context-based trust management system for the social Internet of Things. IEEE, pp 1–6
Zouari J, Hamdi M, Kim T-H (2017) A privacy-preserving homomorphic encryption scheme for the Internet of Things. IEEE, pp 1–6
Dorsemaine B, Gaulier J-P, Kheir N (2017) A new threat assessment method for integrating an IoT infrastructure in an information system. ICDCSW, pp 1–8
Sicari S, Rizzard A, Grieco L, Coen-Porisini A (2017) A secure ICN-IoT architecture. IEEE, pp 1–6
Massonet P, Deru L, Achour A, Livin A (2017) End-to-end security architecture for federated cloud and IoT networks. IEEE, pp 1–6
Batool S, Saqib NA, Khan MA (2017) Internet of Things data analytics for user authentication and activity recognition. FMEC, pp 1–5
Jerald V, Rabara A, Premila D (2016) Algorithmic approach to security architecture for integrated IoT smart services environment. WCCCT, pp 1–6
Stergiou C, Psanni KE (2017) Architecture for security monitoring in IOT environments. IEEE, pp 1–4
Nakagawa I, Shimojo S (2017) IoT agent platform mechanism with transparent cloud computing framework for improving IoT security. COMPSAC, pp 1–6
Praveena A (2017) Achieving data security in wireless sensor networks using ultra encryption standard version – IV algorithm. ICIGEHT, pp 1–5
Khan WZ, Zangoti H, Aalsalern Y (2016) Mobile RFID in Internet of Things: security attacks, privacy risks, and countermeasures. IEEE, pp 1–6
Abderrahim O, Elhdhili MH (2017) TMCoI-SIOT: a trust management system based on communities of interest for the Social Internet of Things. IEEE, pp 1–6
Midi D, Rullo A, Mudgerikar A, Bertino E (2017) Kalis – a system for knowledge-driven adaptable intrusion detection for the Internet of Things. ICDCS, pp 1–11
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S.K., Khuntia, B. (2020). Distributed Authentication Security for IOT Using DASS and LOKI91. In: Jain, V., Chaudhary, G., Taplamacioglu, M., Agarwal, M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-0372-6_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0371-9
Online ISBN: 978-981-15-0372-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)