A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography

The spread of the Internet of Things (IoT) has caused a variety of devices to communicate with one another, producing enormous volumes of data and nurturing a linked ecosystem. However, the privacy of users, the integrity of the data, and secure authentication are seriously jeopardised by this link....

Full description

Saved in:
Bibliographic Details
Published inJournal of discrete mathematical sciences & cryptography Vol. 26; no. 5; pp. 1597 - 1611
Main Authors Limkar, Suresh, Ashok, Wankhede Vishal, Singh, Sanjeev, Singh, Amrik, Wagh, Sharmila K., Ajani, Samir N.
Format Journal Article
LanguageEnglish
Published 2023
Online AccessGet full text

Cover

Loading…
More Information
Summary:The spread of the Internet of Things (IoT) has caused a variety of devices to communicate with one another, producing enormous volumes of data and nurturing a linked ecosystem. However, the privacy of users, the integrity of the data, and secure authentication are seriously jeopardised by this link. In this context, we suggest a unique technique that makes use of identity-based anonymity and cryptographic authentication in IoT infrastructure in order to solve these problems.In order to facilitate safe communications between IoT devices, users, and service providers, our proposed mechanism creates a third-party authenticated protocol. This anonymity protection reduces the danger of unauthorised tracking and data exploitation by securing user names and usage patterns from possible attackers.The proposed system ensures the integrity and confidentiality of data transmitted between IoT devices and service providers by utilising sophisticated encryption algorithms. Additionally, it simplifies the authentication procedure, improving system efficiency overall without sacrificing security. The proposed technique into practise and assessed it using real-world IoT infrastructure scenarios, showcasing how well it protects user privacy and ensures safe communication. The findings show that the mechanism has a low computing cost and can withstand a range of security threats, making it a viable option for identity-based anonymity and authentication in IoT networks. Our approach makes a significant contribution to protecting user data and encouraging trustworthy interactions in IoT infrastructure as the IoT environment continues to grow.
ISSN:0972-0529
2169-0065
DOI:10.47974/JDMSC-1827