Abstract

IoT is an emerging topic in the field of IT that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentication of IoT is necessary for ensuring that machines and devices could be trusted when it comes to data sharing. The whole idea of authentication further prevents cybercriminals from using loopholes in IoT devices to access data that they are not allowed to access. Various authentication techniques could be used to secure IoT servers and devices. Establishing mutual authentication between IoT servers and IoT devices has attracted a lot of research interests because it helps enhance the effectiveness and overall security of data sharing. Therefore, this research provides the basis for analyzing the whole idea of using security keys to encrypt both IoT servers and IoT devices.

Highlights

  • The Internet of Things (IoT) is one of the latest technological innovations that has attracted a lot of interest from researchers and information technology (IT) experts in the last couple of years

  • By focusing on using security keys to authenticate IoT servers and IoT devices, this study offers a foundation for making more discoveries of even more effective authentication techniques

  • If IoT devices could have been configured in a manner that allows for communication only with authorized servers, the outside communication attempts could have been ignored

Read more

Summary

Introduction

The Internet of Things (IoT) is one of the latest technological innovations that has attracted a lot of interest from researchers and IT (information technology) experts in the last couple of years. Mutual authentication between IoT servers and IoT devices is considered by experts as a critical step of securing the entire IoT system. Authentication in the context of IoT servers and IoT devices is a model for the establishment of a trust in the identity of IoT devices and servers to control access and protect data when information is conveyed through the internet or other unsecured network. It is important to have strong IoT authentication because it helps ensure that connected servers and devices could earn the trust of protecting data against possible control commands from malicious actors and unauthorized machines. Authentication plays an integral role in preventing potential attackers from pretending to be authorized IoT servers and IoT devices hoping that they will access sensitive data

Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.