Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Light weight Secured Protocol for Internet of Things (IOT) Data

Author : Ms. Divya T 1 Dr. Vidya Raj C 2

Date of Publication :12th April 2017

Abstract: The Internet of Things (IOT) is an ecosystem of connected physical objects that are accessible through the internet based on interoperable information and communication technology. In the secure communication areas, key exchange protocol is an important cryptographic technique. When two users would like to exchange a message, the transmitted message is encrypted by a session key. This session key is exchanged between two ends of the corresponding connection with the help of trusted third party protocol. This type of protocol protects message delivered between two authorized users. Even this inefficiency, unreliability, inflexibility problems of the existing protocols. Therefore, in this paper, secure multi key exchange protocol based on trusted third party is to provide users with a efficiency and secure protocol which employs Elliptic Curve Cryptography (ECC) and two dimensional operation. These protocols achieve fully mutual authentication between user and trusted server.

Reference :

    1. S. M. Bellovin and M. Merritt, “Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks,” in Proceedings of the Symposium on Security and Privacy,pp. 72-84, may 1992.
    2. M. Abdalla and D. Pointcheval, “Simple Passwordbased Encrypted Key Exchange Protocols”, Topics in cryptology-CT-RSA 2005, LNCS Springer-Verla,pp, 191- 208,2005.
    3. M. Abdalla, P. A. Fouque, and D. Pointcheval, “Password-Based Authentication Key Exchange in the Three-Party Setting,” in Proceedings of the International Workshop on Theory and Practice in Public Key Cryptography, pp. 65-84, January 2005.
    4. R.X. Lu and Z.F. Cao, “Simple Three-Party Key Exchange Protocol,” computers and security, vol. 26, no. 1,pp. 94-97, February 2007
    5. H.R. Chung and W.C Ku, “Three weaknesses in a Simple Three-party Key Exchange Protocol,” Information Sciences. vol. 178, no. 1, pp. 220-229, January 2008.
    6. J.H. Yang and C.C. Chang,” An Efficient ThreeParty Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile Commerce Environment,” Journal of Systems and Software, vol. 82, no. 9, pp. 1497- 1502, September 2009.
    7. W. M. Li, Q. Y. Wen, Q. Su, H. Zhang, and Z. P. Jin, “Password-Authenticated Multiple Key Exchange Protocol for Mobile Application”, China Communications, vol. 9, no. 1, pp. 64-72, January 2012

Recent Article