Open Access Open Access  Restricted Access Subscription or Fee Access

Security challenges in Internet of Things

Mugda kalyan

Abstract


ABSTRACT

With the equipped growth inside the demand for IoT, securing the data content brought numerous entities involved within the IoT architecture has become a crucial difficulty. as a result, the hassle of IOT protection has emerge as more and more difficult day-by-day. In an internet of Things, a selection of gadgets and appliances are interconnected and these things can collect records, speak and build choices with or without human interactions. primarily based at the software necessities in numerous IoT results distinctive authentication schemes are required. And those authentication schemes need to supply security in opposition to the diverse IoT attacker. This paper gives analysis of safety components and evaluation among unique authentication schemes proposed within the literature to authenticate the architectures.

 

Keywords: IOT, Internet, Authentication, data Confidentiality, communication, GSM.

Cite this Article: Mugda kalyan. Security challenges in Internet of Things. International Journal of Broadband Cellular Communication. 2019; 5(2): 35–40p.


Full Text:

PDF

References


Huansheng Ning; Hong Liu “Directed Path Based Authentication Scheme for the Internet of Things“; Journal of Universal Computer Science,vol. 18,no.9, On page (s):1112-1131.

Huansheng Ning; Hong Liu; Yang L.T. “Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things“ ,Parallel and Distributed Systems, IEEE Transactions on, On page(s): 657 - 667 Volume: 26, Issue: 3, March.

Parikshit N.Mahalle ; Bayu Anggorojati ; Neeli R.Prasad; Ramjee Prasad. “Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things“; published on Journal of Cyber Security and Mobility,vol.1, On page(s):309-348.

Fuzhi Chu; Runtong Zhang; Rongqian Ni; Wei Dai “An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Enviornments“ ,16th International Conference on Network- Based Information Systems, Gwangju, South Korea,2013.

Parikshit N. Mahalle; Neeli Rashmi Prasad; Ramjee Prasad, “Threshold Cryptography based Group Authentication (TCGA) Scheme for the Internet of Things”, Aalborg, Denmark,2014.

Kiho Lee1; Ronnie D. Caytiles1; Sunguk Lee, “A Study of the Architectural Design of Smart Homes based on Hierarchical Wireless Multimedia Management Systems “; International Journal of Control and Automation Vol.6, No.6, pp.261-266,2013.




DOI: https://doi.org/10.37628/jbcc.v5i2.1186

Refbacks

  • There are currently no refbacks.