The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computer Vision Conference (CVC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

DOI: 10.14569/IJACSA.2024.0150383
PDF

Enhancing Security in IoT Networks: Advancements in Key Exchange, User Authentication, and Data Integrity Mechanisms

Author 1: Alumuru Mahesh Reddy
Author 2: M. Kameswara Rao

International Journal of Advanced Computer Science and Applications(IJACSA), Volume 15 Issue 3, 2024.

  • Abstract and Keywords
  • How to Cite this Article
  • {} BibTeX Source

Abstract: Future Internet (FI) will be shaped by the Internet of Things (IoT), however because of their limited resources and varied communication capabilities, IoT devices present substantial challenges when it comes to securing connectivity. The adoption of robust security measures is hindered by limited compute power, memory, and energy resources, hence diminishing the promise for improved IoT capabilities. Confidentiality, integrity, and authenticity are ensured via authentication mechanisms are influenced by privacy needs, which are driven by sorts of customers that IoT networks service. Authentication is crucial in vital industries like linked cars and smart cities where hackers might use holes to access sensor data. Verification of the Gate Way Node (GWN), which is responsible for mutual authentication, user and sensor registration, and session key creation, is essential. The efficiency of key creation has been enhanced to tackle temporal intricacies linked to different key lengths. With notable advantages, the novel method shortens the time required to generate cryptographic keys: only 60 milliseconds for 100-bit keys and 120 milliseconds for 256-bit keys. This improvement fortifies resistance against new cyber threats by strengthening security basis of IoT networks and enhancing responsiveness and dependability. Through open transmission channels, users send login requests, and after successfully authenticating, they create session keys to establish secure connections with cloud servers. Python simulation results show how resilient the system is to security threats while preserving affordable interaction, processing, and storage. This development not only strengthens IoT networks but also guarantees their sustainability in the face of changing security threats.

Keywords: IoT; Public key; key authentication; gate way node; data integrity mechanisms

Alumuru Mahesh Reddy and M. Kameswara Rao, “Enhancing Security in IoT Networks: Advancements in Key Exchange, User Authentication, and Data Integrity Mechanisms” International Journal of Advanced Computer Science and Applications(IJACSA), 15(3), 2024. http://dx.doi.org/10.14569/IJACSA.2024.0150383

@article{Reddy2024,
title = {Enhancing Security in IoT Networks: Advancements in Key Exchange, User Authentication, and Data Integrity Mechanisms},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2024.0150383},
url = {http://dx.doi.org/10.14569/IJACSA.2024.0150383},
year = {2024},
publisher = {The Science and Information Organization},
volume = {15},
number = {3},
author = {Alumuru Mahesh Reddy and M. Kameswara Rao}
}



Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

IJACSA

Upcoming Conferences

IntelliSys 2025

28-29 August 2025

  • Amsterdam, The Netherlands

Future Technologies Conference 2025

6-7 November 2025

  • Munich, Germany

Healthcare Conference 2026

21-22 May 2026

  • Amsterdam, The Netherlands

Computing Conference 2026

9-10 July 2026

  • London, United Kingdom

IntelliSys 2026

3-4 September 2026

  • Amsterdam, The Netherlands

Computer Vision Conference 2026

15-16 October 2026

  • Berlin, Germany
The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Computer Vision Conference
  • Healthcare Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org