Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

General Research Article

Iot Secured Disjunctive XOR Two Factor Mutual Authentication for Users

Author(s): Meenu Talwar* and Balamurugan Balusamy

Volume 13, Issue 6, 2020

Page: [1318 - 1324] Pages: 7

DOI: 10.2174/2666255813666191128160711

Price: $65

Abstract

Aims: The paper has introduced an algorithmic modification of M.L.Das's previous work done of " IoT Mutual Authentication".

Background: IoT has proven that if there exists a thing on the earth then it is bound to be connected to the internet to tell its feature on its own. IoT plays a remarkable role in all aspects of our daily lives it covers entertainment, sports, healthcare, education, security, automobiles, industrial as well as home appliances and many more real time applications. To ease our everyday activities, it reinforcing the way people interact with their surroundings. This holistic view brings some major concerns in terms of security and privacy.

Objective: The objective of the work is to increase security and protect the algorithm from various attackers so to use with real time application.

Method: In this we have used XoR (Exclusive OR) operation and because of this we can protect the algorithm from DoS attacks, bypass attack, intruder attack and allow user to change password.

Conclusion: The proposed work has secured all the connected IoT devices to work inde-pendently and secured because every device has to verify at each step in the IoT system before initiating its operation.

Keywords: Wireless Sensor Network (WSN), gateway node (GY-node), sensor node (Sn), user ID(NIDj) two factor authentication, disjunctive XOR two factor authentication method, bypass and insider attack.

Graphical Abstract


Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy