Advertisement

Node Authentication in IoT-Enabled Sensor Network Using Middleware

  • Deepak Prashar
  • Ranbir Singh Batth
  • Atul MalhotraEmail author
  • KavitaEmail author
  • Varam Sudhakar
  • Bhupinder Kaur
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1059)

Abstract

Internet of Things (IoT) always has various issues because of its heterogeneous nature and thus is not very effective while accommodating the authentication mechanisms. To resolve this issue of authentication of the nodes involved in a particular application, a middleware has been proposed in this paper. This proposed middleware acts as a gateway between IoT devices and provides the user the ability of node authentication in wireless sensor network (WSN). When a node or a user accesses the network at any time, it is verified by the middleware. It is also capable to handle the heterogeneous messages which are the main challenge in IoT. By executing proposed framework, interoperability issue between IoT networks can be resolved.

Keywords

Wireless sensor network Authentication Security Internet of Things 

References

  1. 1.
    Salman O, Abdallah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the internet of things. In: IEEE symposium on computers and communicationGoogle Scholar
  2. 2.
    Jung J, Kim J, Choi Y, Won D (2016) An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. 1–30Google Scholar
  3. 3.
    Wong KH, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, vol 1, p 8Google Scholar
  4. 4.
    Jiang C, Li B, Xu H (2007) An efficient scheme for user authentication in wireless sensor networks. In: 21st international conference on advanced information networking and applications workshops, AINAW’07, vol 1. IEEE, pp 438–442Google Scholar
  5. 5.
    Tseng H-R, Jan R-H, Yang W (2011) A robust user authentication scheme with self-certificates for wireless sensor networks. Secur Commun Netw 4(8):815–824CrossRefGoogle Scholar
  6. 6.
    Kumar P, Sain M, Lee HJ (2011) An efficient two-factor user authentication framework for wireless sensor networks. In: 13th international conference on advanced communication technology (ICACT), IEEE, pp 574–578Google Scholar
  7. 7.
    Kumar P, Gurtov A, Ylianttila M, Lee S-G, Lee HJ (2013) A strong authentication scheme with user privacy for wireless sensor networks. ETRI J 35(5):889–899CrossRefGoogle Scholar
  8. 8.
    Vaidya B, Sá Silva J, Rodrigues JJ (2010) Robust dynamic user authentication scheme for wireless sensor networksGoogle Scholar
  9. 9.
    Cheikhrouhou O, Koubaa A, Boujelben M, Abid M (2010) A lightweight user authentication scheme for wireless sensor networks Google Scholar
  10. 10.
    Abduvaliev A, Lee S, Lee YK (2009) Simple hash based message authentication scheme for wireless sensor networksGoogle Scholar
  11. 11.
    Manivannan D, Vijayalakshmi B, Neelamegam P (2011) An efficient authentication protocol based on congruence for wireless sensor networks. In: International conference on recent trends in information technology, Chennai, India, pp 549–553Google Scholar
  12. 12.
    Xiao Q (2004) A biometric authentication approach for high security ad-hoc networks. IEEE, pp 250–256Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Lovely Professional UniversityPhagwaraIndia

Personalised recommendations