Algorithm Feasibility on IoT Devices with Memory and Computational Power Constraints
Journal: International Journal of Science and Research (IJSR) (Vol.8, No. 5)Publication Date: 2019-05-05
Authors : Anusha Medavaka;
Page : 1815-1820
Keywords : IoT Device Authentication; IoT Security; Secure Vault;
Abstract
Internet of Things is a subject of much interest as well as, in last couple of years, safety of the IoT systems is a field of remarkable research activities. Shared verification between IoT devices as well as IoT web servers is a fundamental part of secure IoT systems. Solitary password-based verification mechanisms, which are commonly used, are vulnerable to side-channel and also dictionary attacks. In this paper, we present a multi-key (or multi-password) based shared verification device. In our strategy, the common key in between the IoT server as well as the IoT device is called protected vault, which is a collection of equal sized tricks. First components of the safe vault are shared in between the web server as well as the IoT device and components of the safe and secure vault modification after every successful communication session. We have implemented this device on an Arduino device to confirm our algorithm is practical on IoT devices with memory as well as computational power constraints.
Other Latest Articles
- Verbal Function and Valency in Kinamayu Dialect of Surigao del Sur, Philippines
- Experimental Study on Partial Replacement of Sand by Teak Wood Dust in Concrete
- A Study to Assess the Awareness about Effect of Internet Addiction among Undergraduate Nursing Students in Selected Nursing Colleges
- Ketogenic Diet: A Lifestyle Modification for Type 2 Diabetic Patients
- Effectiveness of Virtual Instructional Package on Knowledge regarding Alzheimers Disease in older Adults at Selected Old Age Homes
Last modified: 2021-06-28 18:12:38