Header menu link for other important links
Algorithm for Trust Based Policy Hidden Communication in the Internet of Things
N. Peshwe,
Published in Institute of Electrical and Electronics Engineers Inc.
Pages: 148 - 153
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in Internet of Things(IoT) several machines communicate with each other, mutual authentication and service discovery must be performed in such a way that each of the devices share information with only those devices that are genuine. Hence, private mutual authentication and automatic service discovery is important for the functioning of the IoT without human intervention. But, this comes at the cost of computation time. Thus, there is a balance to be found between the two. This can be achieved by introducing a trust attribute. We propose here that the distance between the client and server and the presence of a signed token with the client act as components of the trust attribute. Here we mention a hybrid approach that determines in real time which protocol to be used (SIGMA-I or policy hiding prefix based encryption) based on the proximity/distance between the entities involved and presence of a token with the client. © 2017 IEEE.