A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP)
Conference paper
Raheem, A., Lasebae, A. and Loo, J. 2014. A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP). 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Beijing, China Institute of Electrical and Electronics Engineers (IEEE). pp. 840-845 https://doi.org/10.1109/TrustCom.2014.135
Type | Conference paper |
---|---|
Title | A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP) |
Authors | Raheem, A., Lasebae, A. and Loo, J. |
Abstract | The future of the Internet of Things (IoT) involves a huge number of node devices such as wireless sensors that can communicate in a machine-to-machine pattern, where devices will be globally addressed and identified. As the number of connected devices increased, the burden on the network infrastructure and the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone increased as well. Recently, an IETF working group, along with the research group at Cisco, are working on a Locator/ID Separation Protocol as a routing architecture that provides new semantics for IP addressing, in order to simplify routing operations and improve scalability in the future of the Internet such as the IoT. In the light of the previous issue; this paper proposes an efficient security authentication and a key exchange scheme that is suited for Internet of things based on Locator/ID Separation protocol. The proposed protocol method meets practicability, simplicity, and strong notions of security. The protocol is verified using Automated Validation Internet Security Protocols and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and the achieved results showed that they do not have any security flaws. |
Research Group | Foundations of Computing group |
Conference | 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) |
Page range | 840-845 |
ISSN | 2324-898X |
ISBN | |
Hardcover | 9781479965137 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Publication dates | |
24 Sep 2014 | |
Online | 19 Jan 2015 |
Publication process dates | |
Deposited | 09 Jun 2015 |
Accepted | 26 Jun 2014 |
Output status | Published |
Digital Object Identifier (DOI) | https://doi.org/10.1109/TrustCom.2014.135 |
Language | English |
Book title | 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) |
https://repository.mdx.ac.uk/item/858v0
61
total views0
total downloads1
views this month0
downloads this month