A Secure and Efficient Authentication Mechanism for IoT Devices with Mobile Apps
Keywords:
IoT, security, Authentication, SSL, IoT devices, IoT Mobile Application.Abstract
IoT devices are essential in our century for connecting everything to the internet so that users can quickly access and control it from a distance. Saving time, having remote access to resources at any time from anywhere, and having everything connected to the internet are the key benefits of adopting IoT devices. Various issues have arisen in the IoT space over time, most of them are linked to security and privacy. Confidentiality and Integrity are crucial components of security authentication since they help to create a robust security system.IoT protocols currently offer various levels of security that are connected to authentication and authorization, but as time goes on, it will be crucial that these levels of protection against various attacks, such as masquerade attacks, man in the middle attacks, replay attacks, password guessing Impounder attacks, DoS attacks, etc., require more protection at various layers. In this study, we used a temperature sensor (DHT22) with NodeMCU to transmit data over the Internet of Things protocol and receive it at the mobile end in order to analyse security and create a smart solution. This study assesses the security of data transmission from IoT devices to mobile devices and discusses the difficulties we overcame while creating the prototype. While building a prototype that can operate flawlessly and propagate data to the cloud, we are also concentrating on the level of security while transmitting data from IoT devices to the cloud and from the cloud to mobile immediately.
References
35-46.
2. Gaitan, Nicoleta Cristina. “A long-distance communication architecture for medical devices based on LoRaWAN protocol.†Electronics 10.8 (2021): 940.
3. Shah, Rushabh, Alina Chircu. “IOT and ai in healthcare: A systematic literature review.†Issues in Information
Systems 19.3 (2018).
4. Samie, Farzad, Lars Bauer, Jörg Henkel. “IoT technologies for embedded computing: A survey.†2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS). IEEE,
2016.
5. Lee, Suk Kyu, Mungyu Bae, Hwangnam Kim. “Future of IoT networks: A survey.†Applied Sciences 7.10 (2017): 1072.
6. Hassan, Wan Haslina. “Current research on Internet of Things (IoT) security: A survey.†Computer networks
148 (2019): 283-294.
7. Ishaq, Isam, et al. “IETF standardization in the field of the internet of things (IoT): a survey.†Journal of
Sensor and Actuator Networks 2.2 (2013): 235-287.
8. Gilchrist, Alasdair. IoT security issues. Walter de Gruyter GmbH & Co KG, 2017.
9. Shah, Sajjad Hussain, Ilyas Yaqoob. “A survey: Internet of Things (IOT) technologies, applications and
challenges.†2016 IEEE Smart Energy Grid Engineering (SEGE). IEEE, 2016.
10. Deogirikar, Jyoti, Amarsinh Vidhate. “Security attacks in IoT: A survey.†2017 International Conference on
I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2017.
11. Schurgot, Mary R., David A. Shinberg, Lloyd G. Greenwald. “Experiments with security and privacy in
IoT networks.†2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia
Networks (WoWMoM). IEEE, 2015.
12. Safdar, Noreen, Hala Asif, Fatima Farooq. “Energy Use and Human Health Nexus in Pakistan.†Review
of Economics and Development Studies 6.3 (2020): 661-674.
13. Gravely, Shannon, et al. “Discussions between health professionals and smokers about nicotine vaping
products: Results from the 2016 ITC Four Country Smoking and Vaping Survey.†Addiction 114 (2019): 71-85.
14. Abu-Elkheir, Mervat, Mohammad Hayajneh, Najah Abu Ali. “Data management for the internet of things:
Design primitives and solution.†Sensors 13.11 (2013): 15582-15612.
15. Bohli, Jens-Matthias, et al. “SMARTIE project: Secure IoT data management for smart cities.†2015 International Conference on Recent Advances in Internet of Things (RIoT). IEEE, 2015.
16. Zhang, PeiYun, MengChu Zhou, Giancarlo Fortino. “Security and trust issues in fog computing: A survey.â€
Future Generation Computer Systems 88 (2018): 16-27.
17. Hassija, Vikas, et al. “A survey on IoT security: application areas, security threats, solution architectures.†IEEE
Access 7 (2019): 82721-82743.
18. Bertino, Elisa, Nayeem Islam. “Botnets and internet of things security.†Computer 50.2 (2017): 76-79.
19. Grammatikis, Panagiotis I. Radoglou, Panagiotis G. Sarigiannidis, Ioannis D. Moscholios. “Securing the
Internet of Things: Challenges, threats and solutions.†Internet of Things 5 (2019): 41-70.
20. Ramotsoela, Daniel, Adnan Abu-Mahfouz, Gerhard Hancke. “A survey of anomaly detection in industrial
wireless sensor networks with critical water system infrastructure as a case study.†Sensors 18.8 (2018): 2491.
21. Abomhara, Mohamed, Geir M. Køien. “Security and privacy in the Internet of Things: Current status and
open issues.†2014 international conference on privacy and security in mobile systems (PRISMS). IEEE, 2014.
22. Hassija, Vikas, et al. “A survey on IoT security: application areas, security threats, solution architectures.†IEEE
Access 7 (2019): 82721-82743. Cerullo, Gianfranco, et al. “Iot and sensor networks security.†Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. Academic Press, 2018. 77-101.
Tang, Xiao, Pinyi Ren, Zhu Han. “Jamming mitigation via hierarchical security game for iot communications.†IEEE
Access 6 (2018): 5766-5779. Thakkar, Ankit, Ritika Lohiya. “A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, challenges.†Archives of Computational Methods in Engineering 28.4 (2021): 3211- 3243. Lin, Yunâ€Wei, Yiâ€Bing Lin, Chunâ€You Liu. “AItalk: a tutorial to implement AI as IoT devices.†IET Networks 8.3 (2019): 195-202