sensors-logo

Journal Browser

Journal Browser

IoT Authentication and Trusted Sensing

A special issue of Sensors (ISSN 1424-8220).

Deadline for manuscript submissions: closed (15 March 2019) | Viewed by 4060

Special Issue Editors


E-Mail Website
Guest Editor
Distributed Systems & Internet of Things Cluster and Centre for Cyber Security Research and Innovation, School of Information Technology, Deakin University, Melbourne, VIC 3125, Australia
Interests: Internet of Things; mobile cloud computing; fog computing; edge computing; intelligent transport systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Engineering, UNSW Sydney Sydney, NSW 2052, Australia
Interests: Blockchains; IoT; pervasive computing; cybersecurity; data analytics
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Information Technology, Deakin University, Geelong, VIC, Australia
Interests: communication systems, protocol design, wireless networks, security and privacy
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Science, School of Computer Science, Queensland University of Technology, Brisbane, QLD 4000, Australia
Interests: cryptology; cryptanalysis; cryptography; symmetric ciphers; stream ciphers; authenticated encryption
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

A workshop “AUTHENTICATION FOR THE FUTURE INTERNET OF THINGS” (http://www.authiot2018.conferences.academy/programme.html) will be held in Melbourne, Australia, in November, 2018. Internet of Things (IoT) security, privacy, trust, ethics and risks are important topics as the IoT continues to grow extensively, including things of all kinds from industrial IoT, consumer devices to autonomous vehicles and smart drones. Work streams and participants from the workshop are invited to submit papers to be considered for this special issue.

Beyond workshop participants, we invite researchers from academia and industry to contribute original research articles, as well as review articles, to this Special Issue. Potential topics include, but are not limited to:

  • Cryptographic systems and applications in IoT
  • IoT blockchain and distributed ledgers
  • IoT smart contracts and authentication
  • IoT privacy-preserving schemes and security
  • IoT risk management
  • IoT trusted sensing
  • IoT identity management
  • IoT authentication mechanisms
  • IoT security-as-a-service
  • IoT-Cloud authentication mechanisms, tools and platforms
  • Lightweight ciphers and authentication schemes
  • Testing and configuration of IoT authentication technologies
  • Authentication in cooperative IoT systems

Prof. Seng Loke
A/Prof. Salil Kanhere
Prof. Robin Doss
Dr. Leonie Simpson
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 1932 KiB  
Article
An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
by Rafael Martínez-Peláez, Homero Toral-Cruz, Jorge R. Parra-Michel, Vicente García, Luis J. Mena, Vanessa G. Félix and Alberto Ochoa-Brust
Sensors 2019, 19(9), 2098; https://doi.org/10.3390/s19092098 - 06 May 2019
Cited by 37 | Viewed by 3553
Abstract
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing [...] Read more.
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases. Full article
(This article belongs to the Special Issue IoT Authentication and Trusted Sensing)
Show Figures

Graphical abstract

Back to TopTop