Secure Authentication for Unified Software Architecture for Smart Computing IoT devices through Mobile App

Authors

  • Syed Faizan Haider Department of Computer Science, Jamia Millia Islamia, New Delhi
  • Syed Afzal Murtaza Rizvi Department of Computer Science, Jamia Millia Islamia, New Delhi

Keywords:

IoT, security, Authentication, SSL, IoT devices, IoT Mobile Application

Abstract

IoT devices play a significant part in the connectivity of everything to the internet in this century, making it possible for users to effortlessly access and control their gadgets from a distant location. The primary benefit of using Internet of Things devices is the ability to save time, have remote access to resources at any time and from any location, and have everything linked to the internet. Since its inception, the Internet of Things (IoT) industry has been plagued by a number of problems, most of which are concerned with data protection and security. Confidentiality and integrity both play an important part in the authentication process for security, which is necessary in order to create a robust security system. At this time, Internet of Things protocols also offer various levels of security, all of which are connected in some way to authentication and authorization. However, as time goes on, it will become increasingly important that the level of protection against various attacks, such as masquerade attacks, man-in-the-middle attacks, replay attacks, password guessing Impounder attacks, DoS attacks, and so on, requires more protection at different layers. We used a temperature sensor (DHT22) with Node MCU in this research to investigate security and develop a smart solution. We propagated data over the Internet of Things protocol and received it at the Mobile end. In this study, we examine the safe transmission of data from the Internet of Things devices to mobile devices and highlight the problems we faced and overcame while constructing the prototype. Additionally, we are concentrating on the level of security involved in the transmission of data from the Internet of Things devices to the cloud as well as from the cloud to mobile devices directly, and we are developing a prototype that is capable of operating flawlessly and that propagates data smoothly to the cloud.

Downloads

Download data is not yet available.

References

Ray, Partha Pratim. "A survey of IoT cloud platforms." Future Computing and Informatics Journal 1.1-2 (2016): 35-46.

Gaitan, Nicoleta Cristina. "A long-distance communication architecture for medical devices based on LoRaWAN protocol." Electronics 10.8 (2021): 940.

Shah, Rushabh, and Alina Chircu. "IOT and ai in healthcare: A systematic literature review." Issues in Information Systems 19.3 (2018).

Samie, Farzad, Lars Bauer, and Jörg Henkel. "IoT technologies for embedded computing: A survey." 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS). IEEE, 2016.

Lee, Suk Kyu, Mungyu Bae, and Hwangnam Kim. "Future of IoT networks: A survey." Applied Sciences 7.10 (2017): 1072.

Hassan, Wan Haslina. "Current research on Internet of Things (IoT) security: A survey." Computer networks 148 (2019): 283-294.

Ishaq, Isam, et al. "IETF standardization in the field of the internet of things (IoT): a survey." Journal of Sensor and Actuator Networks 2.2 (2013): 235-287.

Gilchrist, Alasdair. IoT security issues. Walter de Gruyter GmbH & Co KG, 2017.

Shah, Sajjad Hussain, and Ilyas Yaqoob. "A survey: Internet of Things (IOT) technologies, applications and challenges." 2016 IEEE Smart Energy Grid Engineering (SEGE). IEEE, 2016.

Deogirikar, Jyoti, and Amarsinh Vidhate. "Security attacks in IoT: A survey." 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, 2017.

Schurgot, Mary R., David A. Shinberg, and Lloyd G. Greenwald. "Experiments with security and privacy in IoT networks." 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2015.

Safdar, Noreen, Hala Asif, and Fatima Farooq. "Energy Use and Human Health Nexus in Pakistan." Review of Economics and Development Studies 6.3 (2020): 661-674.

Gravely, Shannon, et al. "Discussions between health professionals and smokers about nicotine vaping products: Results from the 2016 ITC Four Country Smoking and Vaping Survey." Addiction 114 (2019): 71-85.

Abu-Elkheir, Mervat, Mohammad Hayajneh, and Najah Abu Ali. "Data management for the internet of things: Design primitives and solution." Sensors 13.11 (2013): 15582-15612.

Bohli, Jens-Matthias, et al. "SMARTIE project: Secure IoT data management for smart cities." 2015 International Conference on Recent Advances in Internet of Things (RIoT). IEEE, 2015.

Zhang, PeiYun, MengChu Zhou, and Giancarlo Fortino. "Security and trust issues in fog computing: A survey." Future Generation Computer Systems 88 (2018): 16-27.

Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.

Bertino, Elisa, and Nayeem Islam. "Botnets and internet of things security." Computer 50.2 (2017): 76-79.

Grammatikis, Panagiotis I. Radoglou, Panagiotis G. Sarigiannidis, and Ioannis D. Moscholios. "Securing the Internet of Things: Challenges, threats and solutions." Internet of Things 5 (2019): 41-70.

Ramotsoela, Daniel, Adnan Abu-Mahfouz, and Gerhard Hancke. "A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study." Sensors 18.8 (2018): 2491.

Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the Internet of Things: Current status and open issues." 2014 international conference on privacy and security in mobile systems (PRISMS). IEEE, 2014.

Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.

Cerullo, Gianfranco, et al. "Iot and sensor networks security." Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. Academic Press, 2018. 77-101.

Tang, Xiao, Pinyi Ren, and Zhu Han. "Jamming mitigation via hierarchical security game for iot communications." IEEE Access 6 (2018): 5766-5779.

Thakkar, Ankit, and Ritika Lohiya. "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges." Archives of Computational Methods in Engineering 28.4 (2021): 3211-3243.

Lin, Yun, Wei, Yi, Bing Lin, and Chun‐You Liu. "AItalk: a tutorial to implement AI as IoT devices." IET Networks 8.3 (2019): 195-202.

Gyawali, M. Y. P. ., Angurala, D. M. ., & Bala, D. M. . (2020). Cloud Blockchain Based Data Sharing by Secure Key Cryptographic Techniques with Internet of Things. Research Journal of Computer Systems and Engineering, 1(2), 07:12. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/5

Prof. Sharayu Waghmare. (2012). Vedic Multiplier Implementation for High Speed Factorial Computation. International Journal of New Practices in Management and Engineering, 1(04), 01 - 06. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/8

Mandal, D., Shukla, A., Ghosh, A., Gupta, A., & Dhabliya, D. (2022). Molecular dynamics simulation for serial and parallel computation using leaf frog algorithm. Paper presented at the PDGC 2022 - 2022 7th International Conference on Parallel, Distributed and Grid Computing, 552-557. doi:10.1109/PDGC56933.2022.10053161 Retrieved from www.scopus.com

Downloads

Published

16.08.2023

How to Cite

Haider, S. F. ., & Rizvi, S. A. M. . (2023). Secure Authentication for Unified Software Architecture for Smart Computing IoT devices through Mobile App. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 649–654. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3319

Issue

Section

Research Article