International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 258

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 5, May 2019 | Popularity: 6.2 / 10


     

Algorithm Feasibility on IoT Devices with Memory and Computational Power Constraints

Anusha Medavaka


Abstract: Internet of Things is a subject of much interest as well as, in last couple of years, safety of the IoT systems is a field of remarkable research activities. Shared verification between IoT devices as well as IoT web servers is a fundamental part of secure IoT systems. Solitary password-based verification mechanisms, which are commonly used, are vulnerable to side-channel and also dictionary attacks. In this paper, we present a multi-key (or multi-password) based shared verification device. In our strategy, the common key in between the IoT server as well as the IoT device is called protected vault, which is a collection of equal sized tricks. First components of the safe vault are shared in between the web server as well as the IoT device and components of the safe and secure vault modification after every successful communication session. We have implemented this device on an Arduino device to confirm our algorithm is practical on IoT devices with memory as well as computational power constraints.


Keywords: IoT Device Authentication, IoT Security, Secure Vault


Edition: Volume 8 Issue 5, May 2019


Pages: 1815 - 1820



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Anusha Medavaka, "Algorithm Feasibility on IoT Devices with Memory and Computational Power Constraints", International Journal of Science and Research (IJSR), Volume 8 Issue 5, May 2019, pp. 1815-1820, https://www.ijsr.net/getabstract.php?paperid=ART20198261, DOI: https://www.doi.org/10.21275/ART20198261



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article
Top