期刊
EXPERT SYSTEMS
卷 39, 期 5, 页码 -出版社
WILEY
DOI: 10.1111/exsy.12788
关键词
authentication; cloud computing; Internet of Things; OTP; SIT
This research proposes an authentication-based solution for designing a secure communication network to ensure safe access to data and prevent attackers from unauthorized access to various IoT applications. The proposed technique, LEOBAT, is shown to be fast and efficient through comparison with other popular cryptosystems.
Authentication is one of the foremost pillars in the Internet of Things (IoT) security that authenticates the identity of a device or a person with the help of a unique identification number. If authentication is compromised then an intruder can gain access and launch a variety of attacks on the network. The world of IoT devices is benefiting us in many ways, but the vulnerability of becoming a victim of cybercrime is also increasing at a rapid pace. This research paper proposes an authentication-based solution for designing a secure communication network to ensure safe access to data and stop attackers from any unauthorized access to various IoT applications using cryptography and cloud computing. The proposed work is then compared with other popular cryptosystems such as Secure Internet of Things (SIT), Data Encryption Standard (DES) and Blowfish. LEOBAT is simulated using MATLAB and proves to be a fast and efficient authentication technique.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据