Authentication of constrained devices pose a severe challenge in meeting the security requirements of a network. Internet of Things mostly comprises of such constrained devices, and therefore require light and efficient authentication schemes to operate effectively without any security glitches. This purpose was served by cryptosystems based on integer factorization problem and discrete logarithm problem for a long time. But, these problems have rendered inefficient since the forthcoming of Quantum Computers. Therefore our authentication scheme uses code based cryptography which provides the necessary security measures against traditional as well as Quantum computers. We also verify our authentication scheme using the necessary tools
Volume 11 | 06-Special Issue
Pages: 97-107