{"title":"通过移动App访问物联网设备的安全认证机制","authors":"Bhupinder Singh, R. Lal, Sanjay Singla","doi":"10.1109/ICCMSO58359.2022.00061","DOIUrl":null,"url":null,"abstract":"In this century IoT devices play a major role in connecting all things to the internet so that users can easily access and operate it remotely. The main advantage of using IoT devices is to save time, remotely access resources any time from anywhere & everything connected with the internet. Over the period various challenges occurred in the IoT domain and mostly are related to security & privacy. In security authentication, confidentiality & Integrity play a significant role in order to provide a strong security mechanism. Currently IoT protocols also provide different levels of security which are somehow related to authentication and authorization, but over time it becomes important that level of protection against different attacks i.e. masquerade attacks, man in the middle, replay attacks, password guessing lmpounder attacks, DoS attacks etc., required more protection at different layers. In this paper to analyze security and make a smart solution, we have taken a temperature sensor (DHT22) with NodeMCU to propagate data through the IoT protocol and received it at Mobile end. This paper evaluates how data passes securely from IoT devices to Mobile and highlights what challenges we solved during developing the prototype. We are also focusing on the level of security while transmitting data from IoT devices to Cloud and Cloud to Mobile directly and developing a prototype which can work perfectly and propagates data smoothly to Cloud.","PeriodicalId":209727,"journal":{"name":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure Authentication mechanism for accessing IoT devices through Mobile App\",\"authors\":\"Bhupinder Singh, R. Lal, Sanjay Singla\",\"doi\":\"10.1109/ICCMSO58359.2022.00061\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this century IoT devices play a major role in connecting all things to the internet so that users can easily access and operate it remotely. The main advantage of using IoT devices is to save time, remotely access resources any time from anywhere & everything connected with the internet. Over the period various challenges occurred in the IoT domain and mostly are related to security & privacy. In security authentication, confidentiality & Integrity play a significant role in order to provide a strong security mechanism. Currently IoT protocols also provide different levels of security which are somehow related to authentication and authorization, but over time it becomes important that level of protection against different attacks i.e. masquerade attacks, man in the middle, replay attacks, password guessing lmpounder attacks, DoS attacks etc., required more protection at different layers. In this paper to analyze security and make a smart solution, we have taken a temperature sensor (DHT22) with NodeMCU to propagate data through the IoT protocol and received it at Mobile end. This paper evaluates how data passes securely from IoT devices to Mobile and highlights what challenges we solved during developing the prototype. We are also focusing on the level of security while transmitting data from IoT devices to Cloud and Cloud to Mobile directly and developing a prototype which can work perfectly and propagates data smoothly to Cloud.\",\"PeriodicalId\":209727,\"journal\":{\"name\":\"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMSO58359.2022.00061\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Computational Modelling, Simulation and Optimization (ICCMSO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMSO58359.2022.00061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Authentication mechanism for accessing IoT devices through Mobile App
In this century IoT devices play a major role in connecting all things to the internet so that users can easily access and operate it remotely. The main advantage of using IoT devices is to save time, remotely access resources any time from anywhere & everything connected with the internet. Over the period various challenges occurred in the IoT domain and mostly are related to security & privacy. In security authentication, confidentiality & Integrity play a significant role in order to provide a strong security mechanism. Currently IoT protocols also provide different levels of security which are somehow related to authentication and authorization, but over time it becomes important that level of protection against different attacks i.e. masquerade attacks, man in the middle, replay attacks, password guessing lmpounder attacks, DoS attacks etc., required more protection at different layers. In this paper to analyze security and make a smart solution, we have taken a temperature sensor (DHT22) with NodeMCU to propagate data through the IoT protocol and received it at Mobile end. This paper evaluates how data passes securely from IoT devices to Mobile and highlights what challenges we solved during developing the prototype. We are also focusing on the level of security while transmitting data from IoT devices to Cloud and Cloud to Mobile directly and developing a prototype which can work perfectly and propagates data smoothly to Cloud.