Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)

Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these...

Full description

Saved in:
Bibliographic Details
Published in:2014 International Conference on Parallel, Distributed and Grid Computing pp. 423 - 428
Main Authors: Kumar, Adarsh, Gopal, Krishna, Aggarwal, Alok
Format: Conference Proceeding
Language:English
Published: IEEE 01.12.2014
Subjects:
ISBN:1479976822, 9781479976829
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.
ISBN:1479976822
9781479976829
DOI:10.1109/PDGC.2014.7030783