A Novel Approach on Mobile User Authentication for Internet of Things

Authors(2) :-Telu Alekhya, M.K.S. Prasad

The expanding number of gadgets inside the IoT is raising worries over the proficiency and exploitability of existing validation techniques. The shortcomings of such strategies, specifically passwords, are very much archived. Albeit elective strategies have been proposed, they regularly depend on clients having the capacity to precisely review complex and frequently dreary data. With the bounty of particular online records, this can frequently be a difficult errand. The developing advanced recollections idea includes the production of a store of recollections speci?c to people. We trust this wealth of individual information can be used as a type of verification. In this paper, we propose our computerized recollections based two-factor validation system, and furthermore display our promising assessment comes about.

Authors and Affiliations

Telu Alekhya
M. Sc. CS, Rajamahendri Degree & P.G College for Women, Rajamahendravaram, Andhra Pradesh, India
M.K.S. Prasad
HOD, M.C.A, Rajamahendri Degree& P.G College for Women, Rajamahendravaram, Andhra Pradesh, India

Digital Memories, Internet of Things (IoT), Authentication, Security

  1. A R. Doherty, N. Caprani, C. . Conaire, V. Kalnikaite, C. Gurrin, A. F. Smeaton, and N. E. OConnor, “Passively Recognising Human Activities Through Lifelogging,” Comput. Human Behav., vol. 27, pp. 1948-1958, 2011.
  2. M Dodge and R. Kitchin, “Outlines of a world coming into existence: pervasive computing and the ethics of forgetting,” Environ. Plan. B Plan. Des., vol. 34, pp. 431-445, 2011.
  3. V Bush, “As We May Think,” The Atlantic Monthly, 1945
  4. L Kelly, “The Information Retrieval Challenge of Human Digital Memories,” BCS IRSG Symposium: Future Directions in Information, 2007.
  5. C Gurrin, D. Byrne, N. OConnor, G. J. F. Jones, and A. F. Smeaton, “Architecture and Challenges of Maintaining a Large-scale, Context- aware Human Digital Memory,” 5th International Conference on Visual Information Engineering, pp. 158-163, 2008.
  6. ETulving,“WhatIsEpisodicMemory?”Curr.Dir.Psychol.Sci.,vol.2, pp. 67-70, 1993.
  7. “Precis of elements of episodic memory,” Behav. Brain Sci., vol. 7, pp. 223-268, 1984.
  8. A Doherty and A. F. Smeaton, “Automatically Augmenting Lifelog Events Using Pervasively Generated Content from Millions of People,” Sensors, vol. 10, pp. 1423-1446, 2010.
  9. J Garside, “Smartphone swipe payment scheme unveiled — money — the guardian,” http://www.theguardian.com/money/2014/feb/06/smartphone-swipe- cards-payments-weve/, accessed 12/06/2015.
  10. T. is Money, “Passwords: Why using a software ’safety box’ can keep your online accounts secure — this is money,” http://www.thisismoney.co.uk/money/saving/article- 3122742/Passwords-using-software-safety-box-online-accounts- secure.html, accessed 07/06/2015.
  11. J. Sun, R. Zhang, J. Zhang, and Y. Zhang, “Sightless two-factor authentication on multi-touch mobile devices,” IEEE Conference on Communications and Network Security (CNS), pp. 436-444, 2014.
  12. U. Abdurrahman, M. Kaiiali, and J. Muhammad, “A new mobile- based multi-factor authentication scheme using preshared number, GPS location and time stamp,” International Conference on Electronics, Computer and Computation (ICECCO), pp. 293-296, 2013.
  13. D. Gewirtz, “Lastpass hack reinforces importance of using multi-factor authentication,” http://www.zdnet.com/article/lastpass-hack-reinforces- importance-of-using-multi-factor-authentication/, accessed 10/06/2015.
  14. R. Lennon, “Changing user attitudes to security in Bring Your Own Device (BYOD) & The Cloud,” Proceedings of the 5th Romania Tier 2 Federation Grid, Cloud & High Performance Computing Science Conference (RO-LCG), pp. 49-52, 2012.
  15. Y. Xuechen, “LED Display Screen Monitoring Platform Based on Iden- tityAuthenticationwithUSBKey,”12th IEEE International Conference on Computer and Information Technology (CIT), pp. 905-909, 2012.
  16. R. Teymourzadeh, “Smart novel computer-based analytical tool for im- age forgery authentication,” IEEE International Conference on Circuits and Systems (ICCAS), pp. 120-125, 2012.

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-05-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 88-94
Manuscript Number : CSEIT118356
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Telu Alekhya, M.K.S. Prasad, "A Novel Approach on Mobile User Authentication for Internet of Things ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.88-94, May-June-2018.
Journal URL : http://ijsrcseit.com/CSEIT118356

Article Preview