Autor: |
Zhang Jiantao, A.M. Moklas Mohamad, Xing Hui, Ilkaeva Marina, A.B. Zakaria Zuki, Meek Bob, Ruan Yuhua, Saiano Filippo, Feng Yi, M. Mailafiya Maryam, Dong Aobo, B. Balamurugan, T. Rijkers Ger, Benko Zsigmond, M. Chiroma Samaila, Abubakar Kabeer, I. García-López Elisa, Natarajan Sampathkumar, Sun Jihong, B.A. Rahim Ezamin, Liao Lingjie, Thirupathi Anand, Liu Lei, M. Shanmugavadivelu Chandra, Marci Giuseppe, Shao Yiming, Palmisano Leonardo, Talwar Meenu, Y. Zhao Richard, Liang Shu, Danmaigoro Abubakar |
Rok vydání: |
2021 |
Předmět: |
|
Zdroj: |
Recent Advances in Computer Science and Communications. 13:1318-1324 |
ISSN: |
2666-2558 |
DOI: |
10.2174/2666255813666191128160711 |
Popis: |
Aims: The paper has introduced an algorithmic modification of M.L.Das's previous work done of " IoT Mutual Authentication". Background: IoT has proven that if there exists a thing on the earth then it is bound to be connected to the internet to tell its feature on its own. IoT plays a remarkable role in all aspects of our daily lives it covers entertainment, sports, healthcare, education, security, automobiles, industrial as well as home appliances and many more real time applications. To ease our everyday activities, it reinforcing the way people interact with their surroundings. This holistic view brings some major concerns in terms of security and privacy. Objective: The objective of the work is to increase security and protect the algorithm from various attackers so to use with real time application. Methods: In this we have used XoR (Exclusive OR) operation and because of this we can protect the algorithm from DoS attacks, bypass attack, intruder attack and allow user to change password. Conclusion: The proposed work has secured all the connected IoT devices to work inde-pendently and secured because every device has to verify at each step in the IoT system before initiating its operation. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|