TY - JOUR
T1 - Token security for internet of things
AU - Narendrakumar, Sudha
AU - Razaque, Abdul
AU - Patel, Varil
AU - Almi’ani, Muder
AU - Rizvi, Syed S.
AU - Hans, Akshat
N1 - Publisher Copyright:
Copyright © 2018 Inderscience Enterprises Ltd.
PY - 2018
Y1 - 2018
N2 - The internet of things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer interconnection over a network. IOT has the potential to provide unlimited benefits in daily life and the number of IOT devices is growing day by day. This scenario leads the internet world to be less secure. Since storage in each device is the main issue, cloud servers are relied upon to store the data. The data is accessed by the registered users for that particular network leading to the problem of security when many devices try to access the same network. Since the generated token has a threat of guessing or cryptanalysis attack, we worked on making it more secure by using cryptanalytics process. The cryptanalytics process is accomplished through the addition of logical operation of the token with OTP and hashing before sending the token to the user and service provider.
AB - The internet of things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer interconnection over a network. IOT has the potential to provide unlimited benefits in daily life and the number of IOT devices is growing day by day. This scenario leads the internet world to be less secure. Since storage in each device is the main issue, cloud servers are relied upon to store the data. The data is accessed by the registered users for that particular network leading to the problem of security when many devices try to access the same network. Since the generated token has a threat of guessing or cryptanalysis attack, we worked on making it more secure by using cryptanalytics process. The cryptanalytics process is accomplished through the addition of logical operation of the token with OTP and hashing before sending the token to the user and service provider.
UR - http://www.scopus.com/inward/record.url?scp=85051039535&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85051039535&partnerID=8YFLogxK
U2 - 10.1504/IJES.2018.093689
DO - 10.1504/IJES.2018.093689
M3 - Article
AN - SCOPUS:85051039535
SN - 1741-1068
VL - 10
SP - 334
EP - 343
JO - International Journal of Embedded Systems
JF - International Journal of Embedded Systems
IS - 4
ER -