IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 2, February 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Survey On Issues In Authentication Based Iot Security

[Full Text]

 

AUTHOR(S)

Dr. S. Kamalakkannan, Ms.N. Sivasankari

 

KEYWORDS

IoT, Authentication, Security Mitigation

 

ABSTRACT

Internet of Things (IoT) is a network of devices which can sense, accumulate and transfer data over the internet without any human intervention. The IoT is an ever-growing network of devices which connect to each other using various networking standards and protocols. But the infrastructure can be viewed as a hierarchy, where endpoint devices connect to larger networks. These end points may be inherently secure but in case of integration into a system security is an issue. The main objective of this paper is to provide the security related issues in an IoT environment.

 

REFERENCES

[1] Mangal Sain, Young Jin Kang, Hoon Jae Lee, Survey on Security in Internet of things: state of the art and challenges, ISBN 978-89-968650-9-4
[2] Website https://www.allerin.com/blog/4-challenges-that-are-faced-by-iot-developers
[3] Mardiana binti Mohamad Noor, Wan Haslina Hassan, Current research on Internet of Things (IoT) security: A survey 1389-1286/© 2018 Elsevier B.V. All rights reserved.
[4] K. Chen , S. Zhang , Z. Li , Y. Zhang , Q. Deng , S. Ray , Y. Jin , Internet-of-Things Security and Vulnerabilities : Taxonomy, Challenges, and Practice, Journal of Hardware and Systems Security 2 (2018) 97–110 .
[5] M. Lavanya , V. Natarajan , Lightweight key agreement protocol for IoT based on IKEv2, Comput. Electr. Eng. 64 (2017) 1339–1351 .
[6] F. Wu , X. Li , L. Xu , S. Kumari , M. Karuppiah , J. Shen , A lightweight and priva- cy-preserving mutual authentication scheme for wearable devices assisted by cloud server, Comput. Electr. Eng. 63 (2017) 168–181 .
[7] J. Srinivas , S. Mukhopadhyay , D. Mishra , Secure and efficient user authentica- tion scheme for multi-gateway wireless sensor networks, Ad Hoc Networks 54 (2017) 147–169 .
[8] Y. Qiu , M. Ma , A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks, IEEE Trans. Ind. Informatics 12 (6) (2016) 2074–2085 .
[9] G. Glissa , A. Meddeb ,6LowPSec: An End-to-End Security Protocol for 6LoW- PAN, Ad Hoc Networks 82 (2018) 100–112 .
[10] S. Shin , T. Kwon , Two-factor authenticated key agreement supporting un- linkability in 5G-integrated wireless sensor networks, IEEE Access 6 (2018) 11229–11241 .
[11] V.S. Latha Tamilselvan , Prevention of blackhole attack in MANET, The 2nd In- ternational Conference on Wireless Broadband and Ultra Wideband Communi- cations (AusWireless 2007), 2007 .
[12] M. Lavanya , V. Natarajan , Lightweight key agreement protocol for IoT based on IKEv2, Comput. Electr. Eng. 64 (2017) 1339–1351
[13] T. Shinzaki , I. Morikawa , Y. Yamaoka , Y. Sakemi , IoT security for utilization of big data: Mutual authentication technology and anonymization technology for positional data, Fujitsu Sci. Tech. J. 52 (4) (2016) 52–60