Explore chapters and articles related to this topic
Novel Authentication and Secure Trust based RPL Routing in Mobile sink supported Internet of Things
Published in Cyber-Physical Systems, 2023
Bandarupalli Rakesh, Parveen Sultana H
P.ID Generation: P.ID is generated using the PUF value and Grid Member Count (GMC). Here, the PUF value is the unique value embedded in each IoT device. In this, PUF value is measured by performing challenge-response pair results. Here, the response value is considered as unique PUF value to generate the P.ID for each GH node.GMC is referred as the total member count of each GH node in the network. The security entity computes the hash values for PUF value and GMC using the blake2b algorithm. The reason behind selecting the blake2b algorithm is that it performs extremely faster compared to conventional hashing algorithms such as MD5, SHA 1, SHA 2 and SHA 3. It also has less number of rounds during the hash computation process. Hence, it doesn’t introduce any delay during the registration process. Further, it is highly suitable for the resource constraint environment like IoT network. Here, the hash is performed using two different functions such as mixing and compression functions. The generated hash functions are utilised to generate the hash values for both PUF value and GMC. The generated hash values for both credentials are represented as follows: