Mutual Authentication between IOT and Cloud Servers
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Internet of Things (IoT) is an upcoming statement of belief where reference and communication technology connect multiple confined devices to the Internet for perfor ming idea exchange. Owing to the huge development about technology, confined devices are becoming preferably sophisticated every moment and are over deployed in at variance arenas of life. An important advancement in today’s technology is the power to involve one devices to lavish resource pools one as cloud. Integration of confined devices and cloud servers brings bountiful applicability of IoT in many fame as amply as Government sectors. However, the warranty concerns such as authentication and message privacy of these devices spring a integral role in helpful integration of these two technologies. Elliptic Curve Cryptography (ECC) based algorithms address better warranty solutions in anti-climax to disparate Public Key Cryptography (PKC) algorithms discipline to low key sizes and feasible computations. In this function, a procure ECC based national authentication decorum for procure communication of confined devices and dwarf servers via Hyper Text Transfer Protocol (HTTP) cookies has been proposed. The considered schema achieves national authentication and provides essential warranty requirements. The warranty analysis of the expected protocol proves realized is slim against multiple stake attacks. The reserved verification of the proposed protocol is performed via AVISPA what under the hood, which confirms its money in the bank in the survival of a convenient intruder.
Authors and Affiliations
T. Keerthisri, M. Lakshmi Prasanna, Ch. Kranthi Kumar
Performance Analysis of Actively Cooled Solar PV Panel Subje cted to Concentrated Radiation
Solar energy is converted into electrical energy by solar photovoltaic panels. These photovoltaic panels are named as solar PV panels or modules. The amount of electricity generated by these panels is directly proportio...
An Increment Feature Selection Approach for Intrusion Detection System in MANET
Network security is very important in this internet world. Now, all kind of activities such as money transactions, buying and selling are done through internet only. Many security mechanisms have been introduced in the...
slugPalmprint Identification Based on Adaptive Neuro Fuzzy Inference System
Biometrics plays a very crucial role in various pattern recognitions. Recognition systems are used for offline application and also for online applications. In the biometric family, palmprint based identification system...
Analysis of Casting Defects using Casting Simulation Technique and Using Design of Experiment: A Review
Computer simulation of casting process has emerged as a powerful tool for achieving quality assurance without time consuming trials. Software packages for simulating the solidification of molten metal in the mould enabl...
Identifying and Ranking Product Aspects based on Consumer reviews
The Web has become an excellent source for gathering consumer opinions. For Product Plentiful consumer reviews of products are now available on the internet. User reviews and opinions are very useful for both firms and...