Secure Authentication Protocol for IoT Architecture

Amiya Kumar Sahu, Suraj Sharma, Deepak Puthal, Abhishek Pandey, Rathin Shit

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

In recent years, Internet of Things(IoT) gained popularity due to its enormous applications in many fields. IoT network comprises heterogeneous devices to a great scale, which creates numerous security threats. In this paper, a smart home based on IoT architecture is considered, where the IoT smart Hub(ISH) communicate with the cloud in one hand, and home appliances and smart devices on the other. The IoT smart Hub(ISH) receives commands from the smart phone which is connected to the cloud through the internet, where lies the possibility of an external attack. This paper proposes a secure authentication protocol between smart phone and ISH, which supports ISH for ensuring security in the smart home scenario.

Original languageBritish English
Title of host publicationProceedings - 2017 International Conference on Information Technology, ICIT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages220-224
Number of pages5
ISBN (Print)9781538629246
DOIs
StatePublished - 31 Jul 2018
Event16th International Conference on Information Technology, ICIT 2017 - Bhubaneswar, Odisha, India
Duration: 21 Dec 201723 Dec 2017

Publication series

NameProceedings - 2017 International Conference on Information Technology, ICIT 2017

Conference

Conference16th International Conference on Information Technology, ICIT 2017
Country/TerritoryIndia
CityBhubaneswar, Odisha
Period21/12/1723/12/17

Keywords

  • authentication
  • IoT
  • IoT smart Hub
  • pairwise secret key
  • Security

Fingerprint

Dive into the research topics of 'Secure Authentication Protocol for IoT Architecture'. Together they form a unique fingerprint.

Cite this