Abstract
At present, Internet of Things (IoT) finds valuable application in the field of smart cards, smart grid, and intelligent transportation. However, security is a major concern of these IoT networks and there is a possibility for the information drip in the network. Thus, the major concerns in IoT networks are secure authentication and data integrity such that authentication and authorization are the two major countermeasures in the security paradigm, which manages, controls, and communicates a device. Accordingly, a multi-level authentication was proposed based on the memory and machine attributes-based profiling and elliptic curve cryptography. Additionally, adaptive level of authorization was developed based on data importance and feedback. Thus, this paper deliberates a systematic study and investigation of the authentication and authorization protocol. For evaluating the robustness of the method, various attacks, such as Distributed Denial of Service (DDOS), Denial of Service (DOS), Man in Middle, Reply Attack, Server Spoofing attack, stolen verifier attack, and Impersonation attack, are considered. The simulation of the methods is done using these attacks, and the analysis is progressed based on detection rate and detection time. The comparative analysis reveals the effectiveness of the methods against various attacks, discussing the security and the detection time.
Get full access to this article
View all access options for this article.
