Lightweight Authentication Protocol in Internet-of-Things
DOI:
https://doi.org/10.32628/CSEIT206283Keywords:
Cloud Computing, Internet of Things, Authentication, RSA, AES - 128 bitAbstract
Internet of Things is the extension of Internet connectivity into physical devices, called IoT devices which are connected to Cloud Servers, which help them perform many functions, including, but not limited to security protocols. However, the distance between the Cloud Server and the end device could hamper the connectivity and also risk the security. Authentication is one of the major issues that needs to be taken care of in this scenario. This paper aims to look into this issue as well as to provide a viable solution.
References
- Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R. H., Morrow, M. J., & Polakos, P. A. (2017). A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 20(1), 416-464
- G. Shanmugasundaram, V. Aswini, G. Suganya, “A Comprehensive Review on Cloud Computing Security”, International Conference on Innovations in Information, Embedded, and Communication Systems (ICIIECS), 2017.
- Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854-864.
- Patra, L., & Rao, U. P. (2016, March). Internet of Things—Architecture, applications, security and other major challenges. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 1201-1206
- Farooq, H. (2017). A review on cloud computing security using authentication techniques. International Journal of Advanced Research in Computer Science, 8(2).
- Prakash, A., & Kumar, U. (2018). Authentication Protocols and Techniques: A Survey.
- National Healthcare Anti-Fraud Association, United States of America
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.