Authentication and Access Control in IoT Based on Hash Chain Algorithm and Improved Fingerprint with emphasis on its military applications
Author(s):
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
Security and privacy are two major concerns of military organizations. Today, the military uses IoT technologies in various military sectors, such as defense logistics, UAVs, and training. They also use the technology in areas of war programs such as command, control, surveillance and reconnaissance systems to inform senior commanders and soldiers on land, sea and air. In this paper has been presented an optimal method to authenticate and access control in IoT using hash chain and improved fingerprint algorithm. With the proposed method, users can access the information of IoT servers with high security so that the access control service and information accuracy are considered. It will also solve the bottleneck problem that most storage methods are suffering from. The results show that the proposed method with accuracy of 98%, with FNMR, 0.6% and FMR, 0.1% has better performance compared to similar methods in control access and authentication at IoT. It can be seen in the experimental results the proposed method with 98% accuracy, 0.6% FNMR and 0.1% FMR show better performance compared to similar methods in IoT access control and authentication.
Keywords:
Language:
Persian
Published:
Marine Technology, Volume:8 Issue: 4, 2022
Pages:
1 to 13
https://magiran.com/p2381856
مقالات دیگری از این نویسنده (گان)
-
Diagnosing Heart Disease Using Convolutional Neural Network and the Particle Swarm Optimization
Sara Motamed, *
Journal of Health and Biomedical Informatics, -
Fear Recognition Using Early Biologically Inspired Features Model
*
Journal of Information Systems and Telecommunication, Jan-Mar 2024