Saeed Qy Al-Khalidi , Prakash Kuppuswamy , Syed Ameen Saadullaha Hussaini Quadri, Mohammad Khamruddin Shamshuddin and Ahamed Ali Shaik Meeran
Page: 1-6 | Received 21 Mar 2023, Accepted 07 Jan 2023, Published online: 21 Mar 2023
Full Text Reference XML File PDF File
IoT systems need a high security to protect information exchanged between devices and users. Securing the information and providing authentication are the most significant features of end‐user devices on vulnerable and open network infrastructure. Thus, it is more often and significant to reinforce and modernize the security protocol for IoT devices headed for security perception. The security concern of IoT devices can be fulfilled with effective cryptography algorithm techniques. Several private and public cryptography techniques provide an extensive choice of services to protect users’ information in the form of scrambled text, that can be authenticated only by authorized users or devices. Particularly, end user‐device authentication is essential for the internet of things (IoT). The IoT devices are linked via the internet and they are deployed in open and public places, which creates them susceptible activity by unauthorized agents. Thus, it is significant to design an effective and strong authentication protocol to protect the end userdevice with affordable cost and rapid communication. In the proposed work, the linear matrix‐based, block cipher cryptography protocol scheme is used. The protocol encrypts confidential data using cryptography to generate a different scenario of the same text. In contrast to simple block cipher algorithms based on linear matrix algorithms, symmetric cryptography reduces encryption time but is not concerned about security. The objective of the research paper is to establish secure links for end‐to‐end communication with a proper and high speed authentication scheme.
Saeed Qy Al-Khalidi , Prakash Kuppuswamy , Syed Ameen Saadullaha Hussaini Quadri, Mohammad Khamruddin Shamshuddin and Ahamed Ali Shaik Meeran. An Secure Mutual Authentication and Key Agreement Protocol That Preserves Internet of Things (IoT) Modules.
DOI: https://doi.org/10.36478/rjas.2022.1.6
URL: https://www.makhillpublications.co/view-article/1815-932x/rjas.2022.1.6