Abstract
Authenticity represents an essential facet of information security explored across various Information Systems (IS), including Internet of Things (IoT) devices in Industry 4.0. However, deploying authentication mechanisms in specific IoT devices poses significant challenges, particularly for those with energy, memory, and computational power constraints. Given this context, this ongoing research project aims to compare conventional authentication mechanisms for low-resource IoT devices and identify the most efficient one among them. As an initial result, this paper aims to present our methodological scope and discuss preliminary empirical results derived from a computational experiment using the Non Interactive Zero Knowledge Proofs (NIZKP), algorithm in Arduino Nano. This research seeks to enhance the comprehension of authentication mechanisms in low-resource IoT devices, thus facilitating better decision-making processes in IS settings and contributing to academia and practice.
Publisher
Sociedade Brasileira de Computação (SBC)
Reference22 articles.
1. Abomhara, M. and Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, pages 65–88.
2. Alnahari, W. and Quasim, M. T. (2021). Authentication of iot device and iot server using security key. In 2021 International Congress of Advanced Technology and Engineering (ICOTEN), pages 1–9. IEEE.
3. Baiyere, A., Topi, H., Venkatesh, V., and Donnellan, B. (2020). The internet of things (iot): A research agenda for information systems. Communications of the Association for Information Systems, 47.
4. Boscarioli, C., de Araujo, R. M., Maciel, R. S., Neto, V. V. G., Oquendo, F., Nakagawa, E. Y., Berrnardini, F. C., Viterbo, J., Vianna, D., Martins, C. B., et al. (2017). I grandsi-br: Grand research challenges in information systems in brazil 2016-2026.
5. Chatzigiannakis, I., Pyrgelis, A., Spirakis, P. G., and Stamatiou, Y. C. (2011). Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems, pages 715–720. IEEE.