چكيده به لاتين
The Internet of Things is foreseen as a viable way to provide various services. All smart devices have a basic block for communicating with other smart objects. This communication takes place through a specific Internet network called the Internet of Things (IOT). Assembling and using a set of these smart tools requires a standard Internet to overcome various security challenges. In addition, IOT's business development depends on the requirements of public security, personal privacy issues, cyber threats and organized crime. Wireless Sensor Networks (WSNs) are the most important part of the Internet of Things. Despite the high capacity of developing these types of networks, security risks associated with these networks are high, most of which are exposed sensor nodes vulnerable to Internet attacks. Users' security is also very important. In order to prevent these attacks, based on their priority and importance, algorithms and methods for the exchange of information on wireless networks are presented. In these types of networks, communications are divided into several categories, machine-to-machine communication, and human-to-machine communication. The extent and types of homosexual and non-homogeneous entity relationships have made the protocols highly vulnerable in places where these entities reach each other (for example, the moment of authentication). For this purpose, in this thesis, a new protocol for secure communication in these networks is suggested using asymmetric lightweight cryptography. In addition to the above method, we will use a fuzzy verification method to prevent full disclosure and disclosure of information. The proposed protocol, named 3FA, is evaluated and compared to the performance of the Amin protocol. In this assessment, it is shown that the security of the proposed protocol is resistant to 16 attack types, while the proposed Amin protocol of the 16 attacks is vulnerable to 4 attacks.
Keywords: Internet of Things, Wireless Networks, Authentication Protocol, WSN Network Attacks, Lightweight Encryption, PUF.