Jalaluddin Khan, Jianping Li, Ikram Ali, Shadma Parveen, G. Khan, Mudassir Khalil, Asif Khan, A. Haq, Mohammad Shahid
{"title":"基于Oauth 2.0协议的物联网网络认证技术","authors":"Jalaluddin Khan, Jianping Li, Ikram Ali, Shadma Parveen, G. Khan, Mudassir Khalil, Asif Khan, A. Haq, Mohammad Shahid","doi":"10.1109/ICCWAMTIP.2018.8632587","DOIUrl":null,"url":null,"abstract":"Internet of Things (loT)is the fast-growing emerging technology and it is making our daily life (activities)easier and better. The loT is connecting millions of sensors and heterogeneous devices having different computation, communication, and storage capabilities which are increasing rapidly. The loT network is dissimilar and larger from the conventional network. However, different natures of the connected devices raising security concerns and challenges which affect the importance of loT technology. In this paper, we proposed an authentication scheme based on the OAuth 2.0 protocol to secure access loT network by providing authentication service. An OAuth 2.0 protocol is used to propose authentication mechanism to allow only authorized and authentic users by comparing user information and access tokens in the security manager local database and denies the access to the loT network. It also keeps safe loT network from different types of attacks like impersonation and replays attacks etc.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"An Authentication Technique Based on Oauth 2.0 Protocol for Internet of Things (IoT) Network\",\"authors\":\"Jalaluddin Khan, Jianping Li, Ikram Ali, Shadma Parveen, G. Khan, Mudassir Khalil, Asif Khan, A. Haq, Mohammad Shahid\",\"doi\":\"10.1109/ICCWAMTIP.2018.8632587\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (loT)is the fast-growing emerging technology and it is making our daily life (activities)easier and better. The loT is connecting millions of sensors and heterogeneous devices having different computation, communication, and storage capabilities which are increasing rapidly. The loT network is dissimilar and larger from the conventional network. However, different natures of the connected devices raising security concerns and challenges which affect the importance of loT technology. In this paper, we proposed an authentication scheme based on the OAuth 2.0 protocol to secure access loT network by providing authentication service. An OAuth 2.0 protocol is used to propose authentication mechanism to allow only authorized and authentic users by comparing user information and access tokens in the security manager local database and denies the access to the loT network. It also keeps safe loT network from different types of attacks like impersonation and replays attacks etc.\",\"PeriodicalId\":117919,\"journal\":{\"name\":\"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCWAMTIP.2018.8632587\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCWAMTIP.2018.8632587","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Authentication Technique Based on Oauth 2.0 Protocol for Internet of Things (IoT) Network
Internet of Things (loT)is the fast-growing emerging technology and it is making our daily life (activities)easier and better. The loT is connecting millions of sensors and heterogeneous devices having different computation, communication, and storage capabilities which are increasing rapidly. The loT network is dissimilar and larger from the conventional network. However, different natures of the connected devices raising security concerns and challenges which affect the importance of loT technology. In this paper, we proposed an authentication scheme based on the OAuth 2.0 protocol to secure access loT network by providing authentication service. An OAuth 2.0 protocol is used to propose authentication mechanism to allow only authorized and authentic users by comparing user information and access tokens in the security manager local database and denies the access to the loT network. It also keeps safe loT network from different types of attacks like impersonation and replays attacks etc.