Smart City Gnosys

Smart city article details

Title An Enhanced Authenticated Key Agreement Scheme For Cloud-Based Iot In Wireless Sensor Networks
ID_Doc 8038
Authors Singh S.; Singh A.
Year 2023
Published International Journal of Electrical and Electronics Research, 11, 4
DOI http://dx.doi.org/10.37391/IJEER.110421
Abstract Recent advancements in mobile and wireless technology have fundamentally impacted the underpinnings of cloud computing and IoEs. These changes have changed the way data is communicated across numerous channels, allowing for intelligent discovery and operation. The Internet of Things (IoT) is highly reliant on wireless sensor networks (WSNs), which have several applications in industries ranging from smart medicine to military operations to farming. The IoT's substantial reliance on these activities generates a large amount of data. All the above-specified data is transferred to a remote server for storage and processing. As a result, it is critical to enable safe data access in WSNs by authenticating individuals in altered states of awareness. Authenticating drug addicts in WSNs is still a topic that has not been fully addressed. This study describes a novel and improved authenticated key agreement mechanism for WSNs in cloud-based IoT applications. The technique suggested in this research provides a safe and effective solution for ensuring the confidentiality and integrity of the connection between sensor nodes and the cloud server. To enable a secure key exchange, the system implements a cryptographic method that combines symmetric and asymmetric encryption techniques. Furthermore, it employs a basic authentication approach to ensure that no data has been tampered with during transmission. In terms of security, communication overhead, and computing complexity, the simulation results show that the suggested solution outperforms the alternatives. The proposed methodology applies to a wide range of IoT application cases, including the previously described smart home, smart city, and industrial automation implementations. A comparison of related approaches supports the safety of our solution for WSNs. © 2023 by Sartaj Singh and Amar Singh.
Author Keywords Advanced Encryption Standard; Authenticated Key; Internet of Things; Radio Frequency Identification Technology; Wireless Sensor Networks


Similar Articles


Id Similarity Authors Title Published
4501 View0.893Mercy S.S.; Prabhu C.; Revathi V.; Kumar K.S.; Anitha G.A Secure Iot Based Wireless Sensor Network For An Efficient Modified User Authentication And Key Agreement SchemeIEEE 1st International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics, AIKIIE 2023 (2023)
5129 View0.887Mohammad Z.; Abusukhon A.; Qattam T.A.A Survey Of Authenticated Key Agreement Protocols For Securing Iot2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings (2019)
39136 View0.885Msolli A.; Ajmi N.; Helali A.; Gassoumi A.; Maaref H.; Mghaieth R.New Key Management Scheme Based On Pool-Hash For Wsn And IotJournal of Information Security and Applications, 73 (2023)
4458 View0.875Abi-Char P.E.; Nader P.; Mahfouz S.A Secure And Lightweight Authenticated Key Agreement Protocol For Distributed Iot Applications2020 43rd International Conference on Telecommunications and Signal Processing, TSP 2020 (2020)
23930 View0.87Reddy A.M.; Rao M.K.Enhancing Security In Iot Networks: Advancements In Key Exchange, User Authentication, And Data Integrity MechanismsInternational Journal of Advanced Computer Science and Applications, 15, 3 (2024)
2150 View0.868Alatawi M.N.A Hybrid Cryptographic Cipher Solution For Secure Communication In Smart CitiesInternational Journal of Computer Networks and Applications, 10, 5 (2023)
16766 View0.866Neerul N.; Kumar D.Cryptanalysis And Improvement Of An Authentication Protocol For Wireless Sensor NetworksTransactions on Emerging Telecommunications Technologies, 34, 5 (2023)
4947 View0.864Zhang Z.; Sun Y.; Zhang W.; Wu Y.; Qin Z.A Strongly Secure Pf-Cl-Aka Protocol With Two-Way Id-Based Authentication In Advance For Smart Iot DevicesJournal of Physics: Conference Series, 1812, 1 (2021)
47934 View0.86Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
33253 View0.859Oluwalola F.K.; Oluyemi D.Introduction Of Security And Privacy Issues For Iot And WsnSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)