Authentication and Access control Mechanism using Elliptical Curve Cryptography with Message Authentication Code
Sana Fathima

Sana Fathima, Department of Computer Science & Engineering, Sree Chaitanya College Of Engineering, Karimnagar, India.
Manuscript received on September 22, 2019. | Revised Manuscript received on October 20, 2019. | Manuscript published on October 30, 2019. | PP: 4158-4164 | Volume-9 Issue-1, October 2019 | Retrieval Number: A1405109119/2019©BEIESP | DOI: 10.35940/ijeat.A1405.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Nowadays, Internet of Things (IoT) provided smart and inter-connected devices, which are ranging from tiny sensors to complex nodes of Fog and Cloud, communication protocols and several networking technologies. IoT plays a significant role in various application areas such as e-commerce, healthcare, research, governance and so on, and these application easily accessible for end users. Although the IoT has many benefits, there are some security challenges associated with the vulnerabilities presents in this area. This research work introduced a new authentication and access control model using Message Authentication code (MAC) with Elliptical Curve Cryptography (ECC) to address the security issues in Message Queuing Telemetry Transport (MQTT). In cryptography, a message can be authenticated by MAC (i.e. to verify that whether the message came from authenticate sender and the content of the message is changed or not). If any changes occur to the message content, the verifier can able to detect those changes using MAC values, which preserves the authenticity as well as data integrity. The validated results stated that the proposed ECC-MAC-MQTT shows better performance when compared with existing techniques in terms of accuracy, precision, recall and f-measure.
Keywords: Access Control, Elliptical Curve Cryptography, Internet of Things, Message Authentication Code, Secret Keys, Vulnerabilities.