Research Article Open Access

TPAL: A Protocol for Node Authentication in IoT

Mohamad Faiz Razali1, Mohd Ezanee Rusli1, Norziana Jamil1 and Salman Yussof1
  • 1 Universiti Tenaga Nasional, Malaysia

Abstract

Secure communication in Low power and Lossy Network (LLN) requires the authentication of the identities of nodes for that node to join the network. Since LLN may consist of many different nodes, where some nodes may contain sensitive and subtle information such as military data, monitoring data, or health data, that node needs to be authenticated before it can deliver any data packet. Even though LLN uses an Internet connection, current authentication for Internet protocols cannot be adopted directly into LLN due to LLN’s limited resources. LLN relies on the authentication provided by Routing Protocol for LLN (RPL), which is based on symmetric cryptography. Nevertheless, RPL reserves a mode for future work in terms of public cryptography. In this study, we propose an authentication protocol for LLN that utilizes Elliptic Curve Cryptography (ECC) called as TPAL.

Journal of Computer Science
Volume 14 No. 10, 2018, 1401-1411

DOI: https://doi.org/10.3844/jcssp.2018.1401.1411

Submitted On: 13 March 2018 Published On: 30 October 2018

How to Cite: Razali, M. F., Rusli, M. E., Jamil, N. & Yussof, S. (2018). TPAL: A Protocol for Node Authentication in IoT. Journal of Computer Science, 14(10), 1401-1411. https://doi.org/10.3844/jcssp.2018.1401.1411

  • 3,904 Views
  • 2,505 Downloads
  • 7 Citations

Download

Keywords

  • Verification
  • Lightweight
  • Scheme
  • SPAN-AVISPA
  • Security