Two way authentication system in internet of things (IOT) for impersonation attacks

ISSN: 22773878
0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

IoT security is one of the significant issues confronting us in the computerized age. Programmers regularly mimic the client or the specialist co-op to get into a system. This technique is conceivable when no confirmation is performed to check that each gathering is IOT. In this paper, we propose two way confirmation method for maintaining security at every level and also a block chain server is included for recording every action during communication. To begin with we utilize one verification convention named; OAUTH 2 is utilized for IOT/cloud correspondence. Second verification plot is utilized to share a bit of information that is known just to the gatherings included and along these lines is known as a mutual secrecy. Libsecurity executes the common secret component utilizing a one-time secret word (OTP). Libsecurity is a total, little and (provably) adjust security toolbox for things (endpoints) and entryways. It produces a very secure key, in light of the mutual secret joined with time or occasion based data that you can just utilize once. The utilization of the mutual secret gives the verification.

Cite

CITATION STYLE

APA

Meena, K., & Mundru, S. (2019). Two way authentication system in internet of things (IOT) for impersonation attacks. International Journal of Recent Technology and Engineering, 7(6), 1411–1414.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free