TPAL: A protocol for node authentication in IoT

Research output: Contribution to journalArticle

Abstract

Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated before it can deliver any data packet. Even though LLN uses an Internet connection, current authentication for Internet protocols cannot be adopted directly into LLN due to LLN's limited resources. LLN relies on the authentication provided by Routing Protocol for LLN (RPL), which is based on symmetric cryptography. Nevertheless, RPL reserves a mode for future work in terms of public cryptography. In this study, we propose an authentication protocol for LLN that utilizes Elliptic Curve Cryptography (ECC) called as TPAL.

Original languageEnglish
Pages (from-to)1401-1411
Number of pages11
JournalJournal of Computer Science
Volume14
Issue number10
DOIs
Publication statusPublished - 01 Jan 2018

Fingerprint

Authentication
Cryptography
Network protocols
Routing protocols
Internet protocols
Health
Internet
Internet of things
Monitoring

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Artificial Intelligence

Cite this

@article{583c9ce7f08b486ea24564b6c7636665,
title = "TPAL: A protocol for node authentication in IoT",
abstract = "Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated before it can deliver any data packet. Even though LLN uses an Internet connection, current authentication for Internet protocols cannot be adopted directly into LLN due to LLN's limited resources. LLN relies on the authentication provided by Routing Protocol for LLN (RPL), which is based on symmetric cryptography. Nevertheless, RPL reserves a mode for future work in terms of public cryptography. In this study, we propose an authentication protocol for LLN that utilizes Elliptic Curve Cryptography (ECC) called as TPAL.",
author = "Razali, {Mohamad Faiz} and Rusli, {Mohd Ezanee} and Norziana Jamil and Salman Yussof",
year = "2018",
month = "1",
day = "1",
doi = "10.3844/jcssp.2018.1401.1411",
language = "English",
volume = "14",
pages = "1401--1411",
journal = "Journal of Computer Science",
issn = "1549-3636",
publisher = "Science Publications",
number = "10",

}

TPAL : A protocol for node authentication in IoT. / Razali, Mohamad Faiz; Rusli, Mohd Ezanee; Jamil, Norziana; Yussof, Salman.

In: Journal of Computer Science, Vol. 14, No. 10, 01.01.2018, p. 1401-1411.

Research output: Contribution to journalArticle

TY - JOUR

T1 - TPAL

T2 - A protocol for node authentication in IoT

AU - Razali, Mohamad Faiz

AU - Rusli, Mohd Ezanee

AU - Jamil, Norziana

AU - Yussof, Salman

PY - 2018/1/1

Y1 - 2018/1/1

N2 - Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated before it can deliver any data packet. Even though LLN uses an Internet connection, current authentication for Internet protocols cannot be adopted directly into LLN due to LLN's limited resources. LLN relies on the authentication provided by Routing Protocol for LLN (RPL), which is based on symmetric cryptography. Nevertheless, RPL reserves a mode for future work in terms of public cryptography. In this study, we propose an authentication protocol for LLN that utilizes Elliptic Curve Cryptography (ECC) called as TPAL.

AB - Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated before it can deliver any data packet. Even though LLN uses an Internet connection, current authentication for Internet protocols cannot be adopted directly into LLN due to LLN's limited resources. LLN relies on the authentication provided by Routing Protocol for LLN (RPL), which is based on symmetric cryptography. Nevertheless, RPL reserves a mode for future work in terms of public cryptography. In this study, we propose an authentication protocol for LLN that utilizes Elliptic Curve Cryptography (ECC) called as TPAL.

UR - http://www.scopus.com/inward/record.url?scp=85057013755&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85057013755&partnerID=8YFLogxK

U2 - 10.3844/jcssp.2018.1401.1411

DO - 10.3844/jcssp.2018.1401.1411

M3 - Article

AN - SCOPUS:85057013755

VL - 14

SP - 1401

EP - 1411

JO - Journal of Computer Science

JF - Journal of Computer Science

SN - 1549-3636

IS - 10

ER -