Lightweight Authentication Protocol in Internet-of-Things

Authors

  • Anamika A. Mishra  Department of Computer Science, SVKM's Narsee Monjee Institute of Management Studies, Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India
  • Krushnalee Surve  Department of Computer Science, SVKM's Narsee Monjee Institute of Management Studies, Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India
  • Devika C. Babu  Department of Computer Science, SVKM's Narsee Monjee Institute of Management Studies, Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India
  • Upendra Verma  Assistant Professor, SVKM's Narsee Monjee Institute of Management Studies, Mukesh Patel School of Technology Management and Engineering, Shirpur, Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT206283

Keywords:

Cloud Computing, Internet of Things, Authentication, RSA, AES - 128 bit

Abstract

Internet of Things is the extension of Internet connectivity into physical devices, called IoT devices which are connected to Cloud Servers, which help them perform many functions, including, but not limited to security protocols. However, the distance between the Cloud Server and the end device could hamper the connectivity and also risk the security. Authentication is one of the major issues that needs to be taken care of in this scenario. This paper aims to look into this issue as well as to provide a viable solution.

References

  1. Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R. H., Morrow, M. J., & Polakos, P. A. (2017). A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 20(1), 416-464
  2. G. Shanmugasundaram, V. Aswini, G. Suganya, “A Comprehensive Review on Cloud Computing Security”, International Conference on Innovations in Information, Embedded, and Communication Systems (ICIIECS), 2017.
  3. Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854-864.
  4. Patra, L., & Rao, U. P. (2016, March). Internet of Things—Architecture, applications, security and other major challenges. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 1201-1206
  5. Farooq, H. (2017). A review on cloud computing security using authentication techniques. International Journal of Advanced Research in Computer Science, 8(2).
  6. Prakash, A., & Kumar, U. (2018). Authentication Protocols and Techniques: A Survey.
  7. National Healthcare Anti-Fraud Association, United States of America

Downloads

Published

2020-04-30

Issue

Section

Research Articles

How to Cite

[1]
Anamika A. Mishra, Krushnalee Surve, Devika C. Babu, Upendra Verma, " Lightweight Authentication Protocol in Internet-of-Things, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 2, pp.271-275, March-April-2020. Available at doi : https://doi.org/10.32628/CSEIT206283