22Aug 2016

Secure Authentication Schemes in IoT Environments

  • Department of Computer Science and Engineering, Mar Baselios College of Engineering & Technology , Trivandrum, India.
  • Professor, Department of Computer Science and Engineering, Mar Baselios College of Engineering & Technology, Trivandrum, India
  • Abstract
  • Keywords
  • Cite This Article as
  • Corresponding Author

With the ready increase in the demand for Internet of Things (IoT) services, securing the information content delivered among various entities involved in the IoT architecture has become an important issue. Accordingly, the problem of Internet of Things security has become more and more challenging day-by-day. In an Internet of Things background a variety of devices and appliances are interconnected and these things can assemble data, communicate and build decisions with or without human interactions. Based on the application necessities in various IoT scenarios different authentication schemes are needed. And these authentication schemes should supply security against the various IoT attacker models. This paper presents general analysis of Internet of Things, its security aspects and comparison among different authentication schemes proposed in the literature to authenticate Internet of Things architectures. Also extend the analysis to authentication techniques for limited energy consuming and resource con- strained IoT architectures.


[Sherin Peter and Raju.K.Gopal (2016); Secure Authentication Schemes in IoT Environments Int. J. of Adv. Res. 4 (Aug). 10- 22] (ISSN 2320-5407). www.journalijar.com


Sherin Peter