Skip to main content

Distributed Authentication Security for IOT Using DASS and LOKI91

  • Conference paper
  • First Online:
  • 580 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 612))

Abstract

With the massive expansion of computing technology, the distributed architecture has received wide acceptance for their services. Moreover, IOT technology is used to develop smart applications such as smart security system, health care, smart medicals and smart houses. Due to the vibrant character of access and connectivity in IOT environment, there is mounting of risks and genesis of enormous threat to IOT environment. In proposed system, we have study the fundamental concept behind DASS approach and how to ensure strong authentication services in a distributed environment which will create snag for malicious user. Authentication is particularly a challenging issue in distributed environment due to its multi-sharing concept. DASS works on mutual authentication mechanism when two parties made conversation neither obtain any facts that it could employ to masquerade as the others to an arbiter. Finally, our work is to design the two-level security mechanisms for generating complex security system. In our propose system, work is implemented in two phases, whereas in first phase, we have used authentication process including password and signature for both ends using third party and in second phase data confidentiality using LOKI91 cryptography which is defensive from any differential cryptanalysis and enforcing the secure communication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sravani, Wazid, Ashok, Neeraj (2016) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE, pp 1–16

    Google Scholar 

  2. Sain M, Kang Y, Lee H (2017) Survey on security in Internet of Things: state of the art and challenges. ICACT, pp 1–6

    Google Scholar 

  3. Huh S, Cho S, Kim S (2017) Managing IoT devices using blockchain platform. ICACT, pp 1–4

    Google Scholar 

  4. Fatima B, Abdelhamid B (2017) Risk analysis in Internet of Things using EBIOS. IEEE, pp 1–7

    Google Scholar 

  5. Majeed A (2017) Internet of Things (IoT): a verification framework. IEEE, pp 1–3

    Google Scholar 

  6. Abels T, Khanna R, Midkiff K (2017) Future proof IoT: composable semantics, security, QoS and reliability. IEEE, pp 1–4

    Google Scholar 

  7. El-Maliki T, Seigneur J-M (2016) Efficient security adaptation framework for Internet of Things. IEEE, pp 1–6

    Google Scholar 

  8. Mohsin M, Anwar Z (2016) IoTSAT: a formal framework for security analysis of the Internet of Things (IoT). IEEE, pp 1–9

    Google Scholar 

  9. Baldini G, Le F (2015) Security certification and labelling in Internet of Things. ICT, pp 1–6

    Google Scholar 

  10. Nawir M, Amir A, Yaakob N (2016) Internet of Things (IoT): taxonomy of security attacks. ICED, Thailand, pp 1–6

    Google Scholar 

  11. Sklavos N, Zaharakis D (2016) Cryptography and security in Internet of Things (IoTs): models, schemes, and implementations. IEEE, pp 1–2

    Google Scholar 

  12. Metongnon L, Ezin E, Sadre R (2017) Efficient probing of heterogeneous IoT networks. IFIP, pp 1–7

    Google Scholar 

  13. Abderrahim O, Housine M (2017) CTMS-SIOT: a context-based trust management system for the social Internet of Things. IEEE, pp 1–6

    Google Scholar 

  14. Zouari J, Hamdi M, Kim T-H (2017) A privacy-preserving homomorphic encryption scheme for the Internet of Things. IEEE, pp 1–6

    Google Scholar 

  15. Dorsemaine B, Gaulier J-P, Kheir N (2017) A new threat assessment method for integrating an IoT infrastructure in an information system. ICDCSW, pp 1–8

    Google Scholar 

  16. Sicari S, Rizzard A, Grieco L, Coen-Porisini A (2017) A secure ICN-IoT architecture. IEEE, pp 1–6

    Google Scholar 

  17. Massonet P, Deru L, Achour A, Livin A (2017) End-to-end security architecture for federated cloud and IoT networks. IEEE, pp 1–6

    Google Scholar 

  18. Batool S, Saqib NA, Khan MA (2017) Internet of Things data analytics for user authentication and activity recognition. FMEC, pp 1–5

    Google Scholar 

  19. Jerald V, Rabara A, Premila D (2016) Algorithmic approach to security architecture for integrated IoT smart services environment. WCCCT, pp 1–6

    Google Scholar 

  20. Stergiou C, Psanni KE (2017) Architecture for security monitoring in IOT environments. IEEE, pp 1–4

    Google Scholar 

  21. Nakagawa I, Shimojo S (2017) IoT agent platform mechanism with transparent cloud computing framework for improving IoT security. COMPSAC, pp 1–6

    Google Scholar 

  22. Praveena A (2017) Achieving data security in wireless sensor networks using ultra encryption standard version – IV algorithm. ICIGEHT, pp 1–5

    Google Scholar 

  23. Khan WZ, Zangoti H, Aalsalern Y (2016) Mobile RFID in Internet of Things: security attacks, privacy risks, and countermeasures. IEEE, pp 1–6

    Google Scholar 

  24. Abderrahim O, Elhdhili MH (2017) TMCoI-SIOT: a trust management system based on communities of interest for the Social Internet of Things. IEEE, pp 1–6

    Google Scholar 

  25. Midi D, Rullo A, Mudgerikar A, Bertino E (2017) Kalis – a system for knowledge-driven adaptable intrusion detection for the Internet of Things. ICDCS, pp 1–11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bonomali Khuntia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, S.K., Khuntia, B. (2020). Distributed Authentication Security for IOT Using DASS and LOKI91. In: Jain, V., Chaudhary, G., Taplamacioglu, M., Agarwal, M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_14

Download citation

Publish with us

Policies and ethics