Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India

Research Article

Certificateless Effective Key Management Protocol (CL-EKM) Authentication for Multicast IoT Sensor Network

Download65 downloads
  • @INPROCEEDINGS{10.4108/eai.7-6-2021.2308569,
        author={P.  Manjula and Dr. S.  Bagavathipriya},
        title={Certificateless Effective Key Management Protocol (CL-EKM) Authentication for Multicast IoT Sensor Network},
        proceedings={Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India},
        publisher={EAI},
        proceedings_a={I3CAC},
        year={2021},
        month={6},
        keywords={iot certificateless effective key management protocol key establishment multicast transmission},
        doi={10.4108/eai.7-6-2021.2308569}
    }
    
  • P. Manjula
    Dr. S. Bagavathipriya
    Year: 2021
    Certificateless Effective Key Management Protocol (CL-EKM) Authentication for Multicast IoT Sensor Network
    I3CAC
    EAI
    DOI: 10.4108/eai.7-6-2021.2308569
P. Manjula1,*, Dr. S. Bagavathipriya2
  • 1: Assistant Professor/IT, Veltech Multi-tech Engineering College
  • 2: Professor/CSE, Rajalakshmi Engineering College
*Contact email: manjula.arunraj@gmail.com

Abstract

IoT has a huge issue of security and protection because of its dynamic and heterogeneous nature. In the IoT environment, authentication is one of the most testing security prerequisites. Because a client can straightforwardly access data from the devices, given the mutual validation among client and device occurs. The research includes a CL-EKM and verified key establishment scheme has been proposed for secure communication in the IoT environment. Proposed system utilizing a multicast verification procedure which improves the adaptability of CL-EKM by empowering a delivery message from BS to an enormous cluster head hub with an acceptable delay and cost. Also, the proposed framework is contrasted with the current unicast and broadcast strategies which would cause a serious negative effect on the performance when a network size increases or when quantity of data to be communicated for a time given is enormous. The proposed results examined for security and is additionally implemented utilizing a simulator.