2019
DOI: 10.35940/ijitee.a4378.119119
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Scheme for an IoT Environment using Advanced Multiple Encryption System

M. Sundarrajan*,
A.E. Narayanan

Abstract: Internet of Things (IoT) has become one of the most important fields of research as it plays a vital role in performing an assigned task with various smart devices. These connected devices work together to achieve a common goal. Numerous researchers have been working in various sectors of IoT for obtaining a betterment in the entire function of an IoT environment. Securing the data being transmitted or stored in these smart devices in one of the major fields of research. Some of the security challenges faced i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…This steady work has two minor flaws: first, it uses TLS for the initial authentication; second, it stores a list of topics and authorized clients on the broker. Sundarrajan et al [ 48 ] used advanced multiple encryption systems (AMES) based on the Hardy Wall encryption, requiring less bandwidth and minimal memory while utilizing the MQTT protocol. This is proposed to ensure the secure communication of messages without any packet loss.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This steady work has two minor flaws: first, it uses TLS for the initial authentication; second, it stores a list of topics and authorized clients on the broker. Sundarrajan et al [ 48 ] used advanced multiple encryption systems (AMES) based on the Hardy Wall encryption, requiring less bandwidth and minimal memory while utilizing the MQTT protocol. This is proposed to ensure the secure communication of messages without any packet loss.…”
Section: Related Workmentioning
confidence: 99%
“…As reflected in Table 9, no previous attempt could collectively provide all the security features that MARAS provides. [17]       antle et al [21]       h et al [28]       dhyay et al [29]       ntasukrat et al [30]       fir et al [31]       n et al [32]       arajan et al [33]       ammari [34]       y et al [35]       pa et al [36]       arno et al [37]       yasri et al [38]       l et al [39]       ib et al [40]       sikeas et al [41]       wiyuga et al [42]       hir et al [43]       dana et al [44]       bretta et al [45]       et al [47]       darrajan et al [48]       in et al [49]       juan et al [50]       oretti et al [51]       y et al [52] …”
Section: Authorizationmentioning
confidence: 99%