Abstract

In today’s communications, the main challenging facet is Security of LTE systems in terms of various areas such as mutual authentication, key management, forward and backward secrecy, use of efficient security tools, etc. For proper key management, the generation and distribution of random keys is of main concern which can be done with the help of dynamic security tools. In this paper, main features of security tools like, Docker, Java Cryptography Architecture (JCA), Token-based authentication have been reviewed. Docker provides containerized environment based on application virtualization and also lighter than virtual machines. To define cryptographic concepts and algorithms, JCA cites design patterns and an extensible framework for Java platform. Token-based authentication method or system is used to provide secure user access to server using a token, like smart cards.

Highlights

  • In today’s world, almost all devices have been attached to Internet, as they can be operated from all over the world through Internet

  • Internet of Things (IoT) plays vital role to fulfil the needs in present human life

  • Mutual Authentication is a security feature in which a client must prove its identity to a server, and the server must prove its identity to the client, before any application traffic is sent over the client-to-server connection [2]

Read more

Summary

Introduction

In today’s world, almost all devices have been attached to Internet, as they can be operated from all over the world through Internet. Besides the pros of IoT like mitigation of human intervention, more processing speed and accuracy; there are some of cons of IoT like vulnerability to attacks in terms of security issues. Cryptography can be used to provide confidentiality, mutual authentication, integrity, and other security services. Various cryptography tools are available to ratify the security issues in terms of authentication for users by using appropriate key management.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call