User Authentication and Authorization Framework in IoT Protocols

نویسندگان

چکیده

The Internet of Things (IoT) has become one the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, common technologies communication Wi-Fi 2G/3G/4G cellular networks are insufficient for IoT because they designed to serve appliances with immense processing capabilities laptops PCs. Moreover, these centralized use an existing infrastructure. Currently, new Z-Wave, 6LowPAN, Thread dedicated have been developed meet its requirements. These can handle many factors range, data requirements, security, power demands, battery life. Nevertheless, security issues in systems major concerns vulnerabilities may result fatal catastrophes. this paper, enhanced framework authentication authorization is proposed implemented protect protocols from different types attacks man-in-the-middle attacks, reply brute force attacks. combines token that identity verification sender mechanism on device side based time stamps, which turn mitigate need local methods devices. was tested using analysis compared previous related frameworks. shows high capability against currently available Finally, Windows applications simulate phases, check validity through real network, calculate payload added.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flexible authentication framework with bound authentication and authorization

User authentication is an important part of computer network cryptography. It becomes more and more essential for security with the latest progress in the field of computer science. We analyze latest trends in the article. Our goal is to answer the question whether these trends reflect current state in computer networks. We are focused on security and from this point of view we find the progres...

متن کامل

User Authentication and Authorization in the Java(tm) Platform

JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the JavaTM Platform (the JavaTM 2 Software Development Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications, which are ...

متن کامل

User Authentication and Authorization in the Java Platform

Java security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java Platform (the Java 2 Software Development Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications, which are distin...

متن کامل

User-Friendly Authentication and Authorization Using a Smartphone Proxy

We present a novel approach to authenticate and authorize a user, using her personal smartphone. The presented architecture is complemented with a proof-of-concept implementation. The implemented system architecture is based on a single sign-on solution (SSO), extended to allow the usage of the smartphone as authentication and authorization device. We evaluated the system within real-world scen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers

سال: 2022

ISSN: ['2073-431X']

DOI: https://doi.org/10.3390/computers11100147