Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these...
Saved in:
| Published in: | 2014 International Conference on Parallel, Distributed and Grid Computing pp. 423 - 428 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.12.2014
|
| Subjects: | |
| ISBN: | 1479976822, 9781479976829 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network. |
|---|---|
| ISBN: | 1479976822 9781479976829 |
| DOI: | 10.1109/PDGC.2014.7030783 |

