Mobile App Secure Authentication for Unified Software Architecture for Smart Computing IoT Devices

  • Dr. Raman Chadha Professor, CSE Department, UIE, Chandigarh University, Punjab, India.
  • Naveen . Dean IEC School of Engineering, Baddi, Solan.
  • Dr. Sunil Khullar Professor, CSE, Ludhiana College of Engineering & Technology, Punjab.
  • Vinita Kaushik Assistant Professor, CSE Department, Maharaja Agrasen University, Baddi, Solan

Abstract

IoT devices connect everything to the internet in this century. This allows users to remotely access and operate their equipment. Internet of Things (IoT) gadgets save time, allow remote access to resources, and connect things to the Internet. Since its inception, the Internet of Things (IoT) business has faced many difficulties, most of which involve data security. Only security authentication can establish a dependable system. Confidentiality and integrity are crucial to authentication. The Internet of Things protocols now offers varied degrees of authentication and authorization-based security. As time goes on, security against masquerade attacks, man-in-the-middle attacks, replay attacks, password-guessing Impounder assaults, DoS attacks, and others will
require more protection at different stages. Because there are various sorts of system attacks. We used a DHT22 temperature sensor and a Node MCU to analyze security and find a clever solution. We received
the data at Mobile via the Internet of Things protocol. We study secure data transfer from the Internet of Things devices to mobile devices. We also highlight our prototype development issues and solutions. We are also working on a prototype that reliably transmits data from Internet of Things devices to the cloud and from the cloud to mobile devices. We also focus on data transmission security from Internet of Things devices to the cloud.
Keywords: IoT, Security, Authentication, Secure Sockets Layer, IoT Devices, Iot Mobile Applications 

References

References
[1] Ray, Partha Pratim. "A survey of IoT cloud platforms." Future Computing and Informatics Journal 1.1-2 (2016): 35-46.
[2] Gaitan, Nicoleta Cristina. "A long-distance communication architecture for medical devices based on LoRaWAN protocol." Electronics 10.8 (2021): 940.
[3] Shah, Rushabh, and Alina Chircu. "IOT and ai in healthcare: A systematic literature review." Issues in Information Systems 19.3 (2018).
[4] Samie, Farzad, Lars Bauer, and Jörg Henkel. "IoT technologies for embedded computing: A survey." 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS). IEEE, 2016.
[5] Lee, Suk Kyu, Mungyu Bae, and Hwangnam Kim. "Future of IoT networks: A survey." Applied Sciences 7.10 (2017): 1072.
[6] Hassan, Wan Haslina. "Current research on Internet of Things (IoT) security: A survey." Computer networks 148 (2019): 283-294.
[7] Ishaq, Isam, et al. "IETF standardization in the field of the internet of things (IoT): a survey." Journal of Sensor and Actuator Networks 2.2 (2013): 235-287.
[8] Gilchrist, Alasdair. IoT security issues. Walter de Gruyter GmbH & Co KG, 2017.
[9] Shah, Sajjad Hussain, and Ilyas Yaqoob. "A survey: Internet of Things (IOT) technologies, applications and challenges." 2016 IEEE Smart Energy Grid Engineering (SEGE). IEEE, 2016.
[10] Deogirikar, Jyoti, and Amarsinh Vidhate. "Security attacks in IoT: A survey." 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, 2017.
[11] Schurgot, Mary R., David A. Shinberg, and Lloyd G. Greenwald. "Experiments with security and privacy in IoT networks." 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2015.
[12] Safdar, Noreen, Hala Asif, and Fatima Farooq. "Energy Use and Human Health Nexus in Pakistan." Review of Economics and Development Studies 6.3 (2020): 661-674.
[13] Gravely, Shannon, et al. "Discussions between health professionals and smokers about nicotine vaping products: Results from the 2016 ITC Four Country Smoking and Vaping Survey." Addiction 114 (2019): 71-85.
[14] Abu-Elkheir, Mervat, Mohammad Hayajneh, and Najah Abu Ali. "Data management for the internet of things: Design primitives and solution." Sensors 13.11 (2013): 15582-15612.
[15] Bohli, Jens-Matthias, et al. "SMARTIE project: Secure IoT data management for smart cities." 2015 International Conference on Recent Advances in Internet of Things (RIoT). IEEE, 2015.
[16] Zhang, PeiYun, MengChu Zhou, and Giancarlo Fortino. "Security and trust issues in fog computing: A survey." Future Generation Computer Systems 88 (2018): 16-27.
[17] Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.
[18] Bertino, Elisa, and Nayeem Islam. "Botnets and internet of things security." Computer 50.2 (2017): 76-79.
[19] Grammatikis, Panagiotis I. Radoglou, Panagiotis G. Sarigiannidis, and Ioannis D. Moscholios. "Securing the Internet of Things: Challenges, threats and solutions." Internet of Things 5 (2019): 41-70.
[20] Ramotsoela, Daniel, Adnan Abu-Mahfouz, and Gerhard Hancke. "A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study." Sensors 18.8 (2018): 2491.
[21] Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the Internet of Things: Current status and open issues." 2014 international conference on privacy and security in mobile systems (PRISMS). IEEE, 2014.
[22] Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.
[23] Cerullo, Gianfranco, et al. "Iot and sensor networks security." Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. Academic Press, 2018. 77-101.
[24] Tang, Xiao, Pinyi Ren, and Zhu Han. "Jamming mitigation via hierarchical security game for iot communications." IEEE Access 6 (2018): 5766-5779.
[25] Thakkar, Ankit, and Ritika Lohiya. "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges." Archives of Computational Methods in Engineering 28.4 (2021): 3211-3243.
[26] Lin, Yun‐Wei, Yi‐Bing Lin, and Chun‐You Liu. "AItalk: a tutorial to implement AI as IoT devices." IET Networks 8.3 (2019): 195-202.
Published
2023-06-21
How to Cite
CHADHA, Dr. Raman et al. Mobile App Secure Authentication for Unified Software Architecture for Smart Computing IoT Devices. Journal of Advanced Research in Instrumentation and Control Engineering, [S.l.], v. 10, n. 1&2, p. 10-16, june 2023. ISSN 2456-1398. Available at: <http://thejournalshouse.com/index.php/instrumentation-control-engg-adr/article/view/749>. Date accessed: 19 nov. 2024.