1. Security analysis and provision of authentication protocol, based on peer-to-peer structure in IOT platform
- Author
-
Dongdong Liu and Tiantian Ji
- Subjects
Internet of things ,Two-factor authentication ,Verification of Style authenticity ,Security ,Chord Architecture ,Medicine ,Science - Abstract
Abstract The Internet of Things technology allows you to transfer data to any asset through communication networks such as the Internet or intranet. One of the most important problems is security, which includes confidentiality, authenticity validation, and completeness. Among security problems, the most important ones are ensuring authenticity and protecting privacy. The elliptic curve encryption algorithm is famous protocols for maintaining privacy and verifying authenticity. Despite the capabilities they have and provide good security against network attacks, they face challenges such as response time, delay in the authentication and authentication process, as well as the amount of memory consumed. Two-factor authentication (2FA) is a security process where users provide two different authentication factors to authenticate themselves. It also provides a higher level of security than authentication methods that rely on single-factor authentication (SFA). This article presents two novel methods for 2FA that use encryption techniques, scramble architecture, and chord architecture. These methods allow for the authentication process to be initiated by both parties involved in the communication. Three scenarios and three metrics of reaction time, memory usage, and connection latency were used to assess the efficacy of the suggested approach. The average reaction time is improved and is 0.012 s when the lengths of the finger table in the chord structure are increased to 10, 15, and 20. The findings show that the suggested approach reduces computing complexity, reaction time, and communication latency. It has an average reaction time of 0.016 s, an average memory use of 30,360 kb, and an average connection latency of 0.042 s.
- Published
- 2024
- Full Text
- View/download PDF