An Extensive Study on Authentication and Authorization of IOT Devices
Keywords:
Internet of Things, authentication, authorizationAbstract
The rapid proliferation of the Internet of Things (IoT) into diverse application areas such as building and home automation, smart transportation systems, wearable technologies for healthcare, industrial process control and infrastructure monitoring and control is changing the fundamental way in which the physical world is perceived and managed. It is estimated that there will be about 30 billion IoT devices by 2020. Most of these IoT devices are expected to be of low-cost and wireless communication technology based, with limited capabilities in terms of computation and storage. As IoT systems are increasingly being entrusted with sensing and managing highly complex eco-systems, questions about the security and reliability of the data being transmitted to and from the IoT devices are quickly becoming a major concern.
References
- Qin E, Long Y, Zhang C, Huang L (2013) Cloud computing and the Internet of Things: technology innovation in automobile service. In: International Conference on Human Interface and the Management of Information. Springer, pp 173–180
- Francillon A, Danev B, Capkun S (2011) Relay attacks on Passive Keyless Entry and Start Systems in modern cars. In: Proceedings of the 18th Annual Network and Distributed System Security Symposium. The Internet Society. Citeseer
- Vivek Thoutam, “Unique Security Challenges of IoT Devices and Spectrum of Security Considerations”, Journal of Artificial Intelligence, Machine Learning and Neural Network, Vol 01, No. 2, Oct-Nov 2021
- Qiuping W, Shunbing Z, Chunquan D (2011) Study on key technologies of Internet of Things perceiving mine. Procedia Eng 26:2326–2333
- Hernandez G, Arias O, Buentello D, Jin Y (2014) Smart Nest thermostat: a smart spy in your home, Black Hat USA
- Ling Z, Liu K, Xu Y, Jin Y, Fu X An end-to-end view of IoT security and privacy
- Vasundhara D.N, Seetha M, “Rough-set and artificial neural networks-based image classification”, 2nd International Conference on Contemporary Computing and Informatics (IC3I) 2016, 35-39.
- D.N. Vasundhara, M. Seetha, “Accuracy assessment of rough set based SVM technique for spatial image classification”, International Journal of Knowledge and Learning, Vol. 12, No. 3, 2018, 269-285.
- Dr. R. LAKSHMI TULASI, M.RAVIKANTH, “Intrusion Detection System Based On 802.11 Specific Attacks”, International Journal of Computer Science & Communication Networks, Vol 1, Issue 2, Nov 2011
- Peddyreddy. Swathi, “Architecture And Editions of Sql Server”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 2, Issue 4, May-June-2017
- Dr. R. LAKSHMI TULASI, M.RAVIKANTH, “Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems”, International Journal of Computer Trends and Technology, July-Aug 2011
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.