Simple Authentication Method for Vehicle Monitoring IoT Device with Verifiable Data Integrity

Muhammad Yazid, F. Fahmi, Erwin Sutanto, Rachmad Setiawan, Aripriharta, Muhammad Aziz

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

This paper proposes a new authentication method for vehicular monitoring Internet of Things (IoT) systems. Based on parallel hashchains, the proposed method is suitable for low-power and low-cost IoT devices. Encryption keys are continuously generated on identical parallel hashchains on both the IoT device and the server, removing the need to transmit secret keys over the network. The proposed method only needs two transmission handshakes for each authentication and data transmission. It does not need random number generation on the IoT device, reducing hardware requirements and potential security vulnerability. It minimizes power consumption and data transmission cost while providing mutual authentication of both the server and the device. Other merits of our proposed methods include: it provides device anonymity, allows message authentication, provides database integrity verification, is resistant to transmission loss, and is dynamically adaptable to disturbances in transmission network quality.

Original languageEnglish
Pages (from-to)1
Number of pages1
JournalIEEE Internet of Things Journal
Volume10
Issue number8
DOIs
Publication statusAccepted/In press - 2022

Keywords

  • Authentication
  • authentication
  • Cryptography
  • Electronic mail
  • Encryption
  • hash chain
  • internet of things
  • Internet of Things
  • IoT
  • Monitoring
  • Servers

Fingerprint

Dive into the research topics of 'Simple Authentication Method for Vehicle Monitoring IoT Device with Verifiable Data Integrity'. Together they form a unique fingerprint.

Cite this