Security and Authentication for Devices to Achieve Qos in IOT & Cloud
Keywords:
IoT (Internet of Things), Sensor nodes, Routing algorithm, Security.Abstract
The IoT (Internet of Things) is a network which connects things to the Internet for the intend of interchanging information through the information sensing devices with acceptable protocols. On the other hand, Cloud computing has virtually unlimited capabilities in terms of storage and processing power, is a much more mature technology, and has most of the IoT issues at least partially solved. Sensing Devices utilize in households and smart city is now interconnected with the Internet. These interconnections provide a full series of data that can be serene, aggregate, and then collective in sheltered and privacy-aware style. Some essential fields such as Wireless Sensor Network and Intelligent Transport System (ITS), base nodes collect information and transmit it to the destination nodes. Destination sends commands by the relay devices to the base nodes. Therefore, the integration of cloud and Internet of Things to providing the best service to users and have the highest level of customer satisfaction should always provide quality of service can be guaranteed. The purpose of this paper is to evaluate the integrity requirements of cloud services and Internet of Things so that quality of service in these services must be guaranteed. Thus maintaining the security of both base nodes and destination nodes in this kind of communication is a pressing problem. Instead of proposing yet another security scheme, this can be made easy if devices are identified before communication with secure routing.
References
- Prof. Anurag Shukla, Sarsij Tripathi "A Survey on Next generation Computing IoT Issues and Challenges" International Journal of Pure and Applied Mathematics, Volume 118 No. 9 2018, 45-64.
- R. Shantha Mary Joshitta, L. Arockiam "Security in IoT Environment: A Survey" Journal of Information Technology & Mechanical Engineering - IJITME, Vol.2 Issue. 7, July- 2016, pg. 1-8
- Marie-Aurélie Nef, Leonidas Perlepes, Sophia, and Panayotis K. Kikiras "Enabling QoS in the Internet of Things" CTRQ 2012: The Fifth International Conference on Communication Theory, Reliability, and Quality of Service.
- Ravi C Bhaddurgatte, and Vijaya Kumar BP, SMIEEE "A Review: QoS Architecture and Implementations in IoT Environment" Research & Reviews: Journal of Engineering and Technology, ISSN: 2319-9873
- Massimo Villari, Adnan Al-Anbuky, Antonio Celesti, Klaus Moessner et al presents "Leveraging the Internet of Things: Integration of Sensors and Cloud Computing Systems" Volume: 12 issue: 7, 2016
- Diego Mendez, Ioannis Papapanagiotou, Baijian Yang "Internet of Things: Survey on Security and Privacy" Information Security Journal, Submitted on 6 Jul 2017 (v1), last revised 10 Jul 2017 this version, v2.
- Carla Mouradian, Diala Naboulsi, Sami Yangui, Roch H. Glitho, Monique J. Morrow, and Paul A. Polakos "A Comprehensive Survey on Fog Computing: State-of-the-art and Research Challenges" IEEE Communications Surveys & Tutorials Volume: 20, Issue: 1, Firstquarter 2018
- Hourieh KHODKARI, Saied Ghazi MAGHREBI "Necessity of the integration Internet of Things and cloud services with quality of service assurance approach" Vol. 85, 2016, p. 434 - 445
- Gonçalo Marques, Nuno Garcia, Nuno Pombo "A Survey on IoT: Architectures, Elements, Applications, QoS, Platforms and Security concepts" Advances in Mobile Cloud Computing and Big Data in the 5G Era pp 115-130
- M.Mullaiarasu , Dr S.Veni "Comparing and Analysis of Routing protocol in QoS of IoT" International Journal of Innovations & Advancement in Computer Science, IJIACS, ISSN 2347 – 8616, Volume 7, Issue 3, March 2018
- Timo Koskela, Sami Hakola, Tao Chenand Janne Lehtomak "Clustering Concept using Device-to-Device Communication in Cellular System"
- YANG Jin-cui, PANG Hao, ZHANG Xin "Enhanced mutual authentication model of IoT"
- Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Burning and Georg Carle" DTLS based security and two-way authentication for the Internet of Thing" Ad Hoc Networks, 2013 Zitiert von: 47 - Ähnliche Artikel - Alle 6 Versionen
- Huansheng Ning, Hong Liu, Laurence T. Yang, "Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things", IEEE transactions on parallel and distributed systems, VOL. 26, NO. 3, pp. 657-667, MARCH 2015.
- Yijun Mao, Jin Li, Min-Rong Chen, Jianan Liu, Congge Xie, Yiju Zhan"Fully Secure Fuzzy Identity-Based Encryption for Secure IoT Communications" Computer Standards & Interfaces, 25 June 2015
- Omaimah Omar Bamasag, Kamal Youcef-Toum "Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme".
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.