Soumettre la recherche
Mettre en ligne
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud Storage in Smart Banking
•
0 j'aime
•
47 vues
IRJET Journal
Suivre
https://www.irjet.net/archives/V5/i3/IRJET-V5I3296.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 5
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
Security in IoT
Security in IoT
SKS
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
Security in IoT
Security in IoT
gr9293
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
Ulf Mattsson
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
Symantec
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
Iot Security
Iot Security
MAITREYA MISRA
Recommandé
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
Security in IoT
Security in IoT
SKS
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
Security in IoT
Security in IoT
gr9293
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
Ulf Mattsson
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
Symantec
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
Iot Security
Iot Security
MAITREYA MISRA
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
Presentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
IoT Security
IoT Security
Peter Waher
IoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
Introduction to IOT security
Introduction to IOT security
Priyab Satoshi
IoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
IoT Security Challenges
IoT Security Challenges
Forest Interactive
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
security and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
Introduction to IoT Security
Introduction to IoT Security
CAS
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
Salim Hosen
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
Security issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
Internet & iot security
Internet & iot security
Usman Anjum
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
Contenu connexe
Tendances
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
Presentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
IoT Security
IoT Security
Peter Waher
IoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
Introduction to IOT security
Introduction to IOT security
Priyab Satoshi
IoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
Ravindra Dastikop
IoT Security Challenges
IoT Security Challenges
Forest Interactive
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
security and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
Introduction to IoT Security
Introduction to IoT Security
CAS
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
Salim Hosen
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
Security issues and solutions : IoT
Security issues and solutions : IoT
Jinia Bhowmik
Internet & iot security
Internet & iot security
Usman Anjum
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
Tendances
(20)
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Presentation on IOT SECURITY
Presentation on IOT SECURITY
IoT Security
IoT Security
IoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Introduction to IOT security
Introduction to IOT security
IoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
IoT Security Challenges
IoT Security Challenges
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
security and privacy-Internet of things
security and privacy-Internet of things
Introduction to IoT Security
Introduction to IoT Security
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Security issues and solutions : IoT
Security issues and solutions : IoT
Internet & iot security
Internet & iot security
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Similaire à IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud Storage in Smart Banking
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
IoT for Everyday Life
IoT for Everyday Life
ijsrd.com
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Symantec
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
ezzAyman1
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET Journal
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
IoT Device Management
IoT Device Management
FriendlyTech1
IoT.pptx
IoT.pptx
DrPrabakaranPerumal
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
assignment help experts
assignment help experts
#essaywriting
sample assignment
sample assignment
#essaywriting
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
Asiri Hewage
IoT Design Principles
IoT Design Principles
ardexateam
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
Similaire à IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud Storage in Smart Banking
(20)
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IoT for Everyday Life
IoT for Everyday Life
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IoT Device Management
IoT Device Management
IoT.pptx
IoT.pptx
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
assignment help experts
assignment help experts
sample assignment
sample assignment
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
IoT Design Principles
IoT Design Principles
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
ssuser2ae721
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
SachinPawar510423
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Alluxio, Inc.
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Transport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
GOPINATHS437943
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Earthing details of Electrical Substation
Earthing details of Electrical Substation
stephanwindworld
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
JuanCarlosMorales19600
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
saravananr517913
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Dernier
(20)
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Transport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Earthing details of Electrical Substation
Earthing details of Electrical Substation
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud Storage in Smart Banking
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1307 Multifactor Authentication in IoT devices for ensuring secure cloud storage in Smart Banking 1 Monaswarnalakshmi S.R, 2 Sai Aravindhan. C. P 1, 2 Department of Computer Science and Engineering, SNS College of Technology, Coimbatore, Tamil Nadu, India. ----------------------------------------------------------------------------***----------------------------------------------------------------------------- Abstract: Internet of things is an analytics system that allow users to achieve deeper automation, analysis, and integration within a system. It has the ability to process and learnfromthe data provided by the sensors in real world. The data collected by the sensors are stored in cloud for processing.Cloudsystems are prone to security attacks and also have less amount of privacy, so that the IoT devices can be hackedbyintruders.IOT security is the area that is considered for safeguarding the the devices connected in the network. The main problem is security is not considered while designing the devices and its lead to a serious of loss in data privacy. This problem is solved by improving the privacy of both IoT devices and Cloud. This is done with the help of Multi- factor authentication. User who is trying to connect to the IOT device should authenticate the device first and then only the connection to that device with a network is established successfully. Apart from authentication the data is encrypted for gaining more security. The algorithm used to encrypt thedata is AES/RSA algorithm. Thus providing more secured environment to the consumers. The Multi-factor authentication is the process of securing the data storedinthe cloud by means of more than two security layer patches. The user can be able to access the data and the IOT device only after authenticating the security layers. Keywords: IOT, Multi-factor Authentication, RSA, AES. Abbreviation: IoT-Internet of Things RSA-Rivest Shamir Adleman AES-Advanced Encryption Standard 1. INTRODUCTION IoT concept can be explained by term ‘device to device communication’. The device can sense, communicate and connect to other devices which is connected to internet by recognizing the physical address assigned to the devicesand can also share information between them. IoT is a rapidly developing technology on which the future life will rely upon. IoT will become the most used technology in every field around 2025. So, there is a urgent need to provide security to IoT for securing the data in cloud. The IoT refers to the use of intelligently connected device and systems to gather large amount of data. IoT is expected to spread rapidly over the upcoming years. The IoT has the potential to deliver solution that dramatically improve energy efficiency, security, health,education,andmanyother aspects of our daily life clearly the internet of thingsisoneof the most important and powerful development. The key attribute that distinguish from regular way of using internet and IOT is by using the sense framework. Imagine that all the devices are connected in internet and programmed to share information and data, which they can perform this process automatically to make our routine life in a different way, which we had only dreamt of it. This dream can be emerged asa new upcomingtechnologywhere there is a possibility of communication between electronic devices The most commonly used frameworks for IOT is OCF- Open Connectivity Foundation. OMA- Open Mobile Alliance XSF- XMPP Standard Foundation. FDA- Food and Drug Administration GS1. Auto- ID labs. EPCglobal. 1.1 Features of IoT: Device to device communication. Real-Time data management. Access control. Tele health. Transportation management system. Traffic control system. Environmental monitoring and control. 1.2 Advantages of IoT: The work load of human is reduced. Automation processwill be helpful so that thework to be done, can be finished automatically bytheEnd devices. Less man power is needed. Smart manufacturing. Smart transportation. Smart city. Smart energy buildings.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1308 2. LITERATURE REVIEW 2.1 Technology overview The Internet of Things is an emerging technology in a day to day daily life by making all the works easier than it already was. Tracking towards the security of this technology is not that much developed when comparing it with the performance. Thus, the security is a great threat for most of the fields in which the IOT is underplayed. As more and more IoT devices make their way into the world, deployed in uncontrolled and complexenvironments, securing IoT systems presents a number of unique challenges. The top 10 challenges for IOT security are Secure constrained devices Authorize and authenticate devices Manage device updates Secure communication Ensure data privacy and integrity Secure web, mobile, and cloud applications Ensure high availability Detect vulnerabilities and incidents Manage vulnerabilities Predict and preempt security issues Considering on the Secure Constrained Devices, Many IoT devices have limited amounts of storage, memory, and processing capability and they often need to be able to operate on lower power, for example, when running on batteries. Security approaches that rely heavily on encryption are not a good fit for these constrained devices, because they are not capable of performing complex encryption and decryption quickly enough to be able to transmit data securely in real-time. These devices are often vulnerable to side channel attacks, such as power analysis attacks, that can be used to reverse engineer these algorithms. Instead, constrained devices typically only employ fast, lightweight encryption algorithms. Considering upon Authorize and authenticate devices, many devices offering potential points of failure within an IoT system, device authentication andauthorizationiscriticalfor securing IoT systems. Devices must establish their identity before they can access gateways and upstream services and apps. However, there are many IoT devices that fall down when it comes to device authentication, for example, by using weak basic password authentication, or using passwords unchanged from their default values. Adopting an IoT Platform that provides security by default helps to resolve these issues, for example by enabling two factor authentication (2FA) and enforcing the use of strong passwordsor certificates. IoT Platformsalso provide device authorization services used to determine which services, apps, or resourcesthat each device has access to throughout the system. Considering on Managing the device Updates, including security patches, to firmware or software that runs on IoT devices and gateways presents a number of challenges. For example, you need to keep track of which updates are available apply updates consistently across distributed environmentswith heterogeneousdevicesthatcommunicate through a range of different networking protocols. Not all devices support over-the-air updates, or updates without downtime, so devices might need to be physically accessed or temporarily pulled from production to apply updates. Also, updates might not be available for all devices, particularly older devicesor those devices thatarenolonger supported by their manufacturer. Device manager systems often support pushingout updates automatically to devicesaswell as managing rollbacksif the update process fails. They can also help to ensure that only legitimate updates are applied, for example through the use of digital signing. In secure communication, Once the devices themselves are secured, the next IoT security challenge is to ensure that communication across the network between devices and cloud services or apps is secure. Many IoT devices don’t encrypt messages before sending them over the network. However, best practice is to use transport encryption, and to adopt standardslikeTLS.Using separate networks to isolate devices also helps with establishing secure, private communication, so that data transmitted remains confidential. In data privacy and Integrity wherever thedataendsupafter it has been transmitted across the network, it is stored and processed securely. Implementing data privacy includes redacting or anonymizing sensitivedata beforeitisstoredor using data separation to decouple personally identifiable information from IoT data payloads. Data that is no longer required should be disposed of securely, andifdataisstored, maintaining compliance with legal and regulatory frameworks is also an important challenge. Ensuring data integrity, which may involve employing checksums or digital signatures to ensure data has not been modified. Block chain – as a decentralized distributedledger for IoT data – offers a scalable and resilient approach for ensuring the integrity of IoT data. In Securing the Application, the availability of IoT data and the web and mobile apps that rely on that data as well asour access to the physical things managed by IoT systems. The potential for disruption asa result of connectivityoutagesor device failures, or arising as a result of attacks like denial of service attacks, is more than just inconvenience. In some
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1309 applications, the impact of the lack of availabilitycouldmean loss of revenue, damage to equipment, or even loss of life. IoT infrastructure is responsible for essential services such as traffic control, and in healthcare, IoT devices include pacemakers and insulin pumps. To ensure high availability, IoT devices must be protected against cyber-attacks as well asphysical tampering. IoT systemsmustincluderedundancy to eliminate single points of failure, and should also be designed to be resilient and fault tolerant, so that they can adapt and recover quickly when problems do arise. Detecting Vulnerabilities and breaches include monitoring network communications and activity logs for anomalies, engaging in penetration testing andethicalhackingtoexpose vulnerabilities, and applying security intelligence and analytics to identify and notify when incidents occur. Detected Vulnerabilities have to bemanagedandshouldtake a respective action to manage its extent. Device managers maintain a register of devices, which can be used to temporarily disable or isolate affected devicesuntil theycan be patched. This feature is particularly important for key devices such as gateway devices in order to limit their potential to cause harm or disruption, for example, by flooding the system with fake data if they have been compromised. Actions can be applied automatically using a rules engine with rules based on vulnerability management policies. A longer-term IoT security challenge is to apply security intelligence not only for detecting and mitigating issues as they occur, but also to predict and proactively protect against potential security threats. Threat modeling is one approach used to predict security issues. Other approaches include applying monitoring and analyticstools to correlate events and visualize unfolding threats in real-time,aswellas applying AI to adaptively adjust security strategies applied based on the effectiveness of previous actions. 2.2 Overview of the Secured Smart Banking The IoT is used in banking sectorsfor making all thebanking process easier than any time before. But the main threat in consideration of banking is the security which is dealing from the very first. The security consideration on the data and user information about the account detailscan be safely stored in cloud and can also be connected to any IoT devices by implementing Multi-Factor Authentication and also by encrypting the data of all the bank users. Thus by doing so, will implement a high security patch and make the intruders impossible to patch the data and user information. The user can trust the devices and can start transaction or can carry out any other bank function with less consideration on loss of privacy data by doing that. This process will take a external server for storing all the Authentication details in a secure way and once on successful authentication the user can access the data or devices connected in the network. Fig - 1: Overview of secured smart banking 3. PROPOSED WORK As illustrated above, the security in Smart Banking Systemis achieved by means of developing a mobile application. The functionality of the Application can be accessed only if the user authenticates all the security patch level. The data stored in the cloud will be encrypted so that if any intruders peep out of the authentication will also be made useless if the data is encrypted. This can be done with the help of AES algorithm. Firstly, the IoT devices can be accessed only after the clearance of the multi-factor authentication through mobile application. The various multi-factor includes – biometric, OTP, smart card, Strong passwords, etc. Then the user can access and operate the IoT devices safely without the intervention of the intruder. Then the data from the devices are sent to the cloud for processing. The cloud is also prone to security and hence cloud servers and private cloud has to be secured. Secondly, cloud servers are secured with 2 different biometric types for 2 persons at a time. As well as theprivate cloud can be secured with multi-factor authentication. The data that is sent for processing from IoT devices to the cloud can be transformed in a secured way with the help of AES algorithm. The AES algorithm uses has three rounds namely SubBytes, ShiftRows, Mix columns. This project will be helpful in improving the regular banking transaction to smart and secured one. It aims to reduce the security breaches and thus providing a safe and secure banking experience to the people. This implementation can be done with the help of mobile application for the accessing of the data fromtheIoTdevices. This can be linked with cloud storage for knowing the current status of the data from the devices.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1310 Fig - 2: AES flow diagram 3.1 Mobile app information The mobile application can be opened only when the multi- factor authentication is successful and thus having access to the IoT devices and also the cloud. Password for the app should be entered, if the password is correct, an OTP password will be sent to the registered mobile number. Fig - 3: First step in authentication Fig - 4: Second step in authentication The user has to enter the correct and recent OTP. The OTP generation can be done using the Transactionalsmsinwhich there isno need for the entered number to be activatedDND. (Do Not Disturb) Then the next step of authentication is the biometric level, i.e. with the help of fingerprint. This can be developed by creating the instance for the Fingerprint Manager class and call the authenticate() method. Fig - 5: Third step in authentication Most of the device not supported in fingerprint sensor and this works on phones with the API level above 23. Once the biometric is completed then the end of multifactor authentication. This improves the security to a vast extent and difficult for the intruder to gain access to the important data. 3.2 Advantages - By using this application, the hackers who seek for the privacy data of others can be stopped. - The decryption will be not a easy processunlessthe private key is available. - The data will be securely accessed only by successful authentication of multi-factor process. 4. Conclusion This system will be useful in safeguarding the bank account details and the transaction details of a user from many intruders in the network. This system will also take the security level of IoT devices to a next level, that by making the security of the devices stronger than before and giving consideration to IoT devices to be manufactured with security updates for many future purposes. 5. References: [1] Rohan H.Shah, D.P.Salapurkar,”A Multifactor authentication system using secret splitting in the perspective of Cloud of Things”,IEEE International conference on Emerging Trends & Innovation in ICT,2017.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1311 [2] Prachi Garg, Sandeep Goel, Avinash Sharma, “Security techniques for cloud computing environment”, IEEE conference on computing, communication and automation,2017. [3] N.Venkatesh, M.Rathan Kumar, ”Fingerprint authentication for improved cloud security”, IEEE international conference on computing system and information technology for sustainable solutions,2016. [4]N.Jayapandian, A.M.J.Md.Zubair Rahman, S.Radhikadevi, M.Koushikaa,”Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption”, IEEE world conference on Futuristic Trends in Research and Innovation for Social welfare,2016. [5] Xin Pei, Yongjian Wang, Wei Yao, Jiuchuan Lin, Ruxiang Peng, ”Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud”, IEEE Trustcom/BigDataSE/ISPA,2016. [6] Dimitris Schinianakis, ”AlternativeSecurityOptionsin5G and IoT Era”,IEEE circuits and system Magazine,2017. [7] Elias Tabane, Tranos Zuva, ”Is there a room for security and privacy in IoT?”, IEEE International conference on Advances in Computing and Communications Engineering(ICACCE),2016. [8] Kan-Siew-Leong, Paul Loh Ruen Chze, Ang Khoon Wee, Elizabeth Sim, Kan Ee May,”A multi-factors security key generation mechanisms for IoT”,IEEE 9th International Conference on Ubiquitous and Future Networks(ICUFN),2017. [9] Ritambhara, Alka Gupta, Manjit Jaiswal,”An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internert ofthings(IOT)”,IEEE International Conference on Computing,Communication and Automation(ICCCA),2017. [10] Afsoon Yousefi, Seyed Mahdi Jameii,”Improving the security of internet of things using encryption algorithms”,IEEE International Conference on IoT and Application(ICIOT),2017. [11] rafiullah khan,sarmad ulla khan,rifaqat zaheer,shahid khan,”future internet: the internet of things architecture, possible applications and key challenges”.
Télécharger maintenant