Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things - 2015
The Internet of Things (IoT) is turning into an enticing system paradigm to appreciate interconnections through the physical, cyber, and social areas. Throughout the interactions among the ever present things, security issues become noteworthy, and it's significant to establish enhanced solutions for security protection. In this work, we target an existing U2IoT architecture (i.e., unit IoT and ubiquitous IoT), to style an aggregated-proof based hierarchical authentication scheme (APHA) for the layered networks. Concretely, 1) the aggregated-proofs are established for multiple targets to realize back and forth anonymous data transmission; 2) the directed path descriptors, homomorphism functions, and Chebyshev chaotic maps are jointly applied for mutual authentication; 3) totally different access authorities are assigned to attain hierarchical access control. Meanwhile, the BAN logic formal analysis is performed to prove that the proposed APHA has no obvious security defects, and it is doubtless available for the U2IoT architecture and alternative IoT applications.
Did you like this research project?
To get this research project Guidelines, Training and Code... Click Here