Affiliation:
1. ANKARA ÜNİVERSİTESİ, FEN BİLİMLERİ ENSTİTÜSÜ
Abstract
The essential element of the Internet of Things (IoT) environment, the number of devices has traditionally ex-ceeded the number of devices connected to the Internet. This situation is considered positive for the IoT concept but still has negative consequences. Undoubtedly, the most prominent and most important among these results is the security of the devices and the constructed IoT environment. Group-based authentication and authorization methods are crucial to ensure the safety of many IoT devices and the environment. In this study, the “auth” mechanism that performs group-based authentication and authorization processes, serving from the first moment when the devices in the IoT environment are included in the system until they leave the system, has been devel-oped. In the development process of the “auth” mechanism, the Mobius IoT platform, which is evaluated as a golden sample by the oneM2M global organization and developed as an open-source code, is taken as the basis. The “auth” mechanism tested in three different test environments, including simulation, physical, and cloud environments, were tested using five different test scenarios. By using the group management module provided by the IoT service platform and the “auth” mechanism's together, it has been observed that the computational overhead on the devices and the signal traffic in the environment provide up to 4 times efficiency according to performance measurements. With the development of the “auth” mechanism with a flexible structure, it can be operated independently from the IoT server platform, allowing interoperability between oneM2M-based IoT server platforms.
Publisher
Canakkale Onsekiz Mart University
Reference37 articles.
1. Aydin, Y., Kurt, G. K., Ozdemir, E., & Yanikomeroglu, H. (2020). A flexible and lightweight group Authentication Scheme. IEEE Internet of Things Journal, 7(10), 10277-10287. DOI: https://www.doi.org/10.1109/jiot.2020.3004300
2. Apache JMeter. Retrieved June 6, 2020, from http://jmeter.apache.org
3. Cao, J., Ma, M., & Li, H. (2015). GBAAM: Group-based Access Authentication for MTC in LTE Networks. Security and Communication Networks, 8(17), 3282-3299. DOI: https://www.doi.org/10.1002/sec.1252
4. Chen, Y., Wang, J., Chi, K., & Tseng, C. (2010). Group-based Authentication and Key Agreement. Wireless Personal Communications, 62(4), 965-979. DOI: https://www.doi.org/10.1007/s11277-010-0104-7
5. Define IOT. (2015, May 25). Retrieved October 22, 2019, from https://iot.ieee.org/definition.html