Back to Search Start Over

Iot Secured Disjunctive XOR Two Factor Mutual Authentication for Users

Authors :
Zhang Jiantao
A.M. Moklas Mohamad
Xing Hui
Ilkaeva Marina
A.B. Zakaria Zuki
Meek Bob
Ruan Yuhua
Saiano Filippo
Feng Yi
M. Mailafiya Maryam
Dong Aobo
B. Balamurugan
T. Rijkers Ger
Benko Zsigmond
M. Chiroma Samaila
Abubakar Kabeer
I. García-López Elisa
Natarajan Sampathkumar
Sun Jihong
B.A. Rahim Ezamin
Liao Lingjie
Thirupathi Anand
Liu Lei
M. Shanmugavadivelu Chandra
Marci Giuseppe
Shao Yiming
Palmisano Leonardo
Talwar Meenu
Y. Zhao Richard
Liang Shu
Danmaigoro Abubakar
Source :
Recent Advances in Computer Science and Communications. 13:1318-1324
Publication Year :
2021
Publisher :
Bentham Science Publishers Ltd., 2021.

Abstract

Aims: The paper has introduced an algorithmic modification of M.L.Das's previous work done of " IoT Mutual Authentication". Background: IoT has proven that if there exists a thing on the earth then it is bound to be connected to the internet to tell its feature on its own. IoT plays a remarkable role in all aspects of our daily lives it covers entertainment, sports, healthcare, education, security, automobiles, industrial as well as home appliances and many more real time applications. To ease our everyday activities, it reinforcing the way people interact with their surroundings. This holistic view brings some major concerns in terms of security and privacy. Objective: The objective of the work is to increase security and protect the algorithm from various attackers so to use with real time application. Methods: In this we have used XoR (Exclusive OR) operation and because of this we can protect the algorithm from DoS attacks, bypass attack, intruder attack and allow user to change password. Conclusion: The proposed work has secured all the connected IoT devices to work inde-pendently and secured because every device has to verify at each step in the IoT system before initiating its operation.

Details

ISSN :
26662558
Volume :
13
Database :
OpenAIRE
Journal :
Recent Advances in Computer Science and Communications
Accession number :
edsair.doi...........28eb7ae2e66324a29fc971a2c1e69550
Full Text :
https://doi.org/10.2174/2666255813666191128160711