The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: Internet of Things (IoT) has made significant changes in the real world and penetrates all aspects of human life. The user acceptance of IoT is enormously high and its widespread usage is because of the availability of smart phones and tablets. Wide adoption of IoT in the applications of each field always collecting sensitive information and provide a larger surface for intruders. So privacy preserved authentication and access controls are big challenges in its research area. Methods/Statistical Analysis: In this paper we introduced a novel algorithm based on Zero Knowledge Protocol and Accumulated Hashing to provide secure authentication to sensor enabled mobile devices in IoT. Also for ensuring confidentiality in communication proposed a new method for key exchange using current time. Findings: The proposed method fulfills the requirements of resource and battery constrained mobile devices in IoT when compared with traditional authentication and access control mechanisms for other applications.

Keywords

Authentication, Accumulated Hashing, Internet of Things, Mobile Security, Zero Knowledge Protocol
User