An Outlook Architecture
Open Access
- 6 January 2023
- journal article
- research article
- Published by IGI Global in International Journal of Software Innovation
- Vol. 11 (1), 1-20
- https://doi.org/10.4018/ijsi.315744
Abstract
The internet of things (IoT) has recently received much attention due to its revolutionary potential. The internet of things facilitates data interchange in a large number of possible applications, including smart transportation, smart health, smart buildings, and so on. As a result, these application domains can be grouped to form smart life. In response to the IoT's rapid growth, cybercriminals and security professionals are racing to keep up. Billions of connected devices can exchange sensitive information with each other. As a result, securing IoT and protecting users' privacy is a huge concern. A session for communication in a network is established by authenticating and validating the device's identity and checking whether it is a legal device. The IoT technology can be used for various applications only if challenges related to IoT security can be overcome.Keywords
This publication has 52 references indexed in Scilit:
- Design of Secure User Authenticated Key Management Protocol for Generic IoT NetworksIEEE Internet of Things Journal, 2017
- A secure authentication scheme for Internet of ThingsPervasive and Mobile Computing, 2017
- Energy Big Data Security Threats in IoT-Based Smart Grid CommunicationsIEEE Communications Magazine, 2017
- Study on the IOT Architecture and Access TechnologyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT EnvironmentIEEE Internet of Things Journal, 2017
- Two-Tier Device-Based Authentication Protocol Against PUEA Attacks for IoT ApplicationsIEEE Transactions on Signal and Information Processing over Networks, 2017
- On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tagsThe Journal of Supercomputing, 2017
- A secure authentication scheme based on elliptic curve cryptography for IoT and cloud serversThe Journal of Supercomputing, 2017
- Security attacks in IoT: A surveyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devicesInternational Journal of Advanced Intelligence Paradigms, 2017