eduzhai > Applied Sciences > Engineering >

IoT Authentication Scheme using Niederreiter Cryptosystem in Fog Computing Environment

  • Save

... pages left unread,continue reading

Document pages: 7 pages

Abstract: Internet of Things along with it’s immense applicability’s also brings forth some great challenges, primarily in terms of security. As it is clear that IoT devices are resource constrained and have several limitations, secure operation of these devices pose a huge challenge for security experts all around the globe. Previously used cryptosystem such as RSA and ECC fails to provide efficient security measures to these constrained devices in terms of resource consumption as well as in terms of Quantum computer based attacks. In our research we provide a secure authentication scheme that utilizes Fog computing and Niederreiter encryption system. We test our authentication scheme using AVISPA and provide a detailed analysis of our authentication scheme.

Please select stars to rate!


0 comments Sign in to leave a comment.

    Data loading, please wait...