An authentication scheme for an iot environment using advanced multiple encryption system

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things (IoT) has become one of the most important fields of research as it plays a vital role in performing an assigned task with various smart devices. These connected devices work together to achieve a common goal. Numerous researchers have been working in various sectors of IoT for obtaining a betterment in the entire function of an IoT environment. Securing the data being transmitted or stored in these smart devices in one of the major fields of research. Some of the security challenges faced in an IoT environment are in the areas of user authentication, user privacy, access control, information confidentiality, trust, mobile security and policy enforcement. To overcome all these challenges. In this paper, we have proposed a system called AMES (Advanced Multiple Encryption System) which also secures the overall communication of the network. The paper briefs an overview of an IoT environment, consisting of some hackers where the user connection with the controller is blocked without the presence of integrity and confidentiality. The paper also discusses the various security benefits of RSA and SHA. The proposed AMES system is based on Hardy Wall Algorithm and MQTT protocol. The differentiation of the proposed protocol and HTTP protocol is stated clearly The experimental results are obtained for the proposed authentication scheme using NS3 simulator by showing the comparison between existing hybrid security system with our proposed authentication system. The results also state that the designed AMES authentication system using MQTT protocol can minimize the level of security threats and other complications in transmission of the data in IoT environment.

References Powered by Scopus

Internet of Things: A survey on the security of IoT frameworks

713Citations
N/AReaders
Get full text

A roadmap for security challenges in the Internet of Things

384Citations
N/AReaders
Get full text

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

290Citations
N/AReaders
Get full text

Cited by Powered by Scopus

MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications

5Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Sundarrajan, M., & Narayanan, A. E. (2019). An authentication scheme for an iot environment using advanced multiple encryption system. International Journal of Innovative Technology and Exploring Engineering, 9(1), 868–874. https://doi.org/10.35940/ijitee.A4378.119119

Readers over time

‘19‘20‘22‘2400.511.52

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 2

50%

Professor / Associate Prof. 1

25%

Lecturer / Post doc 1

25%

Readers' Discipline

Tooltip

Business, Management and Accounting 1

25%

Computer Science 1

25%

Engineering 1

25%

Psychology 1

25%

Save time finding and organizing research with Mendeley

Sign up for free
0