User Authentication and Authorization Framework in IoT Protocols
نویسندگان
چکیده
The Internet of Things (IoT) has become one the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, common technologies communication Wi-Fi 2G/3G/4G cellular networks are insufficient for IoT because they designed to serve appliances with immense processing capabilities laptops PCs. Moreover, these centralized use an existing infrastructure. Currently, new Z-Wave, 6LowPAN, Thread dedicated have been developed meet its requirements. These can handle many factors range, data requirements, security, power demands, battery life. Nevertheless, security issues in systems major concerns vulnerabilities may result fatal catastrophes. this paper, enhanced framework authentication authorization is proposed implemented protect protocols from different types attacks man-in-the-middle attacks, reply brute force attacks. combines token that identity verification sender mechanism on device side based time stamps, which turn mitigate need local methods devices. was tested using analysis compared previous related frameworks. shows high capability against currently available Finally, Windows applications simulate phases, check validity through real network, calculate payload added.
منابع مشابه
Flexible authentication framework with bound authentication and authorization
User authentication is an important part of computer network cryptography. It becomes more and more essential for security with the latest progress in the field of computer science. We analyze latest trends in the article. Our goal is to answer the question whether these trends reflect current state in computer networks. We are focused on security and from this point of view we find the progres...
متن کاملUser Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the JavaTM Platform (the JavaTM 2 Software Development Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications, which are ...
متن کاملUser Authentication and Authorization in the Java Platform
Java security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java Platform (the Java 2 Software Development Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications, which are distin...
متن کاملUser-Friendly Authentication and Authorization Using a Smartphone Proxy
We present a novel approach to authenticate and authorize a user, using her personal smartphone. The presented architecture is complemented with a proof-of-concept implementation. The implemented system architecture is based on a single sign-on solution (SSO), extended to allow the usage of the smartphone as authentication and authorization device. We evaluated the system within real-world scen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers
سال: 2022
ISSN: ['2073-431X']
DOI: https://doi.org/10.3390/computers11100147