Identity establishment and capability based access control (IECAC) scheme for Internet of Things

Parikshit N. Mahalle, Bayu Anggorojati, Neeli Rashmi Prasad, Ramjee Prasad

Research output: Chapter in Book/Report/Conference proceedingConference contribution

37 Citations (Scopus)

Abstract

Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned attacks. The protocol evaluation by using security protocol verification tool shows that IECAC is secure against these attacks. This paper also discusses performance analysis of the protocol in terms of computational time and compared with other existing solutions.

Original languageEnglish
Title of host publication2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012
Pages187-191
Number of pages5
Publication statusPublished - 1 Dec 2012
Event2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012 - Taipei, Taiwan, Province of China
Duration: 24 Sep 201227 Sep 2012

Publication series

NameInternational Symposium on Wireless Personal Multimedia Communications, WPMC
ISSN (Print)1347-6890

Conference

Conference2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012
CountryTaiwan, Province of China
CityTaipei
Period24/09/1227/09/12

Keywords

  • Access Control
  • Capability
  • Identity Establishment

Fingerprint Dive into the research topics of 'Identity establishment and capability based access control (IECAC) scheme for Internet of Things'. Together they form a unique fingerprint.

Cite this