Danish Showkat, Shubranil Som, S. Khatri, Armaan Singh Ahluwalia
{"title":"Security Implications in IoT using Authentication and Access Control","authors":"Danish Showkat, Shubranil Som, S. Khatri, Armaan Singh Ahluwalia","doi":"10.1109/ICRITO.2018.8748731","DOIUrl":null,"url":null,"abstract":"The Internet of Things digitizes physical assets like sensors, devices, machines, gateways, and the network. IOT connects people to things and things to things in real time. Smartphones, Tablets, wearable technologies, and smart home devices are now being adapted in everyday lives. As the nature of IOT is heterogeneous due to its evolving technologies in several areas. People, devices and organizations are connected in IOT environment. This situation presents many imperatives and confinements. Therefore it is critical to guarantee security that incorporates validation in a proper way. Therefore a well-defined framework should be designed to eliminate the threats that IOT possesses in terms of security. In this paper, a structure has been presented for mobile devices that implements confirmation and authorization.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2018.8748731","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The Internet of Things digitizes physical assets like sensors, devices, machines, gateways, and the network. IOT connects people to things and things to things in real time. Smartphones, Tablets, wearable technologies, and smart home devices are now being adapted in everyday lives. As the nature of IOT is heterogeneous due to its evolving technologies in several areas. People, devices and organizations are connected in IOT environment. This situation presents many imperatives and confinements. Therefore it is critical to guarantee security that incorporates validation in a proper way. Therefore a well-defined framework should be designed to eliminate the threats that IOT possesses in terms of security. In this paper, a structure has been presented for mobile devices that implements confirmation and authorization.