An authentication scheme for an iot environment using advanced multiple encryption system

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things (IoT) has become one of the most important fields of research as it plays a vital role in performing an assigned task with various smart devices. These connected devices work together to achieve a common goal. Numerous researchers have been working in various sectors of IoT for obtaining a betterment in the entire function of an IoT environment. Securing the data being transmitted or stored in these smart devices in one of the major fields of research. Some of the security challenges faced in an IoT environment are in the areas of user authentication, user privacy, access control, information confidentiality, trust, mobile security and policy enforcement. To overcome all these challenges. In this paper, we have proposed a system called AMES (Advanced Multiple Encryption System) which also secures the overall communication of the network. The paper briefs an overview of an IoT environment, consisting of some hackers where the user connection with the controller is blocked without the presence of integrity and confidentiality. The paper also discusses the various security benefits of RSA and SHA. The proposed AMES system is based on Hardy Wall Algorithm and MQTT protocol. The differentiation of the proposed protocol and HTTP protocol is stated clearly The experimental results are obtained for the proposed authentication scheme using NS3 simulator by showing the comparison between existing hybrid security system with our proposed authentication system. The results also state that the designed AMES authentication system using MQTT protocol can minimize the level of security threats and other complications in transmission of the data in IoT environment.

Cite

CITATION STYLE

APA

Sundarrajan, M., & Narayanan, A. E. (2019). An authentication scheme for an iot environment using advanced multiple encryption system. International Journal of Innovative Technology and Exploring Engineering, 9(1), 868–874. https://doi.org/10.35940/ijitee.A4378.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free