Mohamed M. Samy

Work place: Military Technical College/Electrical Engineering Department, Cairo,11571, Egypt

E-mail: m.samy1880@yahoo.com

Website:

Research Interests:

Biography

Mohamed M. Samy: He received his B.Sc. from the Electrical Engineering Department, Military Technical College, Cairo, Egypt in 2003, master student in Ain Shams University Communication and Electronics Department. Currently, Egyptian Armed Forces.

Author Articles
An Optimized Protocol of M2M Authentication for Internet of Things (IoT)

By Mohamed M. Samy Wagdy R. Anis. Ahmed A. Abdel-Hafez Haitham D. Eldemerdash

DOI: https://doi.org/10.5815/ijcnis.2021.02.03, Pub. Date: 8 Apr. 2021

The Internet of Things (IoT) consists of sensors, networks, and services to connect and control production systems. Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices are enabled to exchange information with each other in an autonomous way without human intervention. Resource-Constrained Devices (RCD) have found an expanding demand in the Internet of Things (IoT) applications as these gadgets are essentially working with delicate information. Thus, information security has ended up vital for both makers and clients. However, the creation of defenseless gadgets still challenging regarding the restriction of involved assets especially with the attackers ‘continuous trials to misuse these restrictions chasing important information. Hence, connecting an open key crypto-system becomes a must to extend gadget proficiency and relieve the chance of touchy data loss. Deployments of Elliptic curve cryptography (ECC) are fundamentally an open key crypto-system with the basic distinction of speedier advancing capacity whereas yielding an assortment of distinctive approaches to the arrangement of the cryptographic calculation. We will submit a proposed protocol to overcome the demands of information security and the speed of data circulation. The proposed protocol is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against various attacks.

[...] Read more.
Other Articles