Title: User authentication and key agreement scheme for internet of thing - a study

Authors: M. Durairaj; K. Muthuramalingam

Addresses: School of Computer Science, Engineering and Applications, Bharathidasan University, 620023 Tiruchirappalli, India ' School of Computer Science, Engineering and Applications, Bharathidasan University, 620023 Tiruchirappalli, India

Abstract: Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.

Keywords: authentication complex networks; light weight; key establishment; host identity protocol; explicit authenticated key agreement.

DOI: 10.1504/IJCAET.2018.094338

International Journal of Computer Aided Engineering and Technology, 2018 Vol.10 No.5, pp.589 - 598

Received: 09 Apr 2016
Accepted: 04 Oct 2016

Published online: 11 Jun 2018 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article