Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things

      

ABSTARCT :

Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critical). Moreover, due to open nature of communication channel and resource constrained environment of nodes the privacy, integrity and con_dentiality of the data becomes a big issue as we need to ensure that the said data is only accessed by a valid user in the IIOT environment. Many schemes presented various means to overcome the above issue. However, the existing works do have certain vulnerabilities which make its application in the WSNs constrained. The proposed work presents a scheme for achieving above goals in IIOT environment. Moreover, the proposed scheme presents security vulnerabilities and weaknesses in existing schemes and attempts to overcome these issues; the proposed work provides cryptanalysis of Xiong et al. scheme which is based on ECC, the direct consequence of the cryptanalysis directs to design a solution which can overcome the issues. The proposed work provides a robust hash based conditional privacy preserving authentication and probabilistic key exchange protocol which is lightweight and as a result, puts less computation overheads on the entities involved in the region. The proposed work is secure against many known attacks due to dif_culty in guessing the credentials. The main motivation is to develop a lightweight scheme which can help exchange information with ef_cacy. The security of the proposed work is provided using both formal and informal security analysis where formal analysis comprises of AVISPA and Real-or-Random oracle model simulations whereas informal analysis depicts proofs as of how the proposed work withstands many known attacks. Thus, the proposed work is secure against many malicious attacks directing and championing its application in IIOT environment.

EXISTING SYSTEM :

? Cyber Attack is a type of cyber threats that is targeting to get private information such as credit cards information and social security numbers. ? De-synchronization Attack is the pseudonym stored at the gateway node GW and the sensor node SN memory would not be the same, because of an adversary blocks the communication between the parties. ? There is not a specific solution that can detect whole phishing ? The purpose of this study is to perform Extreme Learning Machine (ELM) based classification for 30 features including Websites Data in UC Irvine Machine Learning Repository database. ? For results assessment, ELM was compared with other machine learning methods such as Support Vector Machine (SVM).

DISADVANTAGE :

• Internet is an essential part of our life. Internet users can be affected from different types of cyber threats. • Thus cyber threats may attack ?nancial data, private information, online banking and e-commerce. • SqlInjection • Dos Attack • Password Attack

PROPOSED SYSTEM :

• In this study, features in the database created for Cyber Attacks are classified by determining the input and output parameters for the Support Vector machine classifier. • Results obtained by SVM show that has higher achievement compared to other classifier methods.

ADVANTAGE :

• The proposed methodology imports data-set of Privacy Information and Image Based Password Authentication from the database and then the imported data is pre-processed. • The Attackers url will be blocked based on request from hackers server.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp