Secured Authentication Systems for Internet of Things

M, Gowtham and Banga, M. and Patil, Mallanagouda (2020) Secured Authentication Systems for Internet of Things. EAI Endorsed Transactions on Smart Cities, 20 (11): e3. ISSN 2518-3893

[thumbnail of eai.13-7-2018.163998.pdf]
eai.13-7-2018.163998.pdf - Published Version
Available under License Creative Commons Attribution No Derivatives.

Download (2MB) | Preview


INTRODUCTION: In these days, an enormous extent of contraptions are interconnected with the remote advances which gave the principal light to the front line development of Internet of Things (IoT). Different quick contraptions and machines are by and by watched and controlled using IoT conventions. The developments of IoT are by and by spread to the entire sphere by which there is superb system in the devices related using IoT. From the assessment reports of, The closeout of splendid home contraptions raised from 1.2 billion dollars to 4.4 billion dollars from year 2015 to year 2019 in the United States. As indicated by the report from Economics Times, there will connect with more than 2 billion units of ESIM based contraptions by year 2024. With the use of ESIM, the endorsers can use the progressed SIM card for the astute contraptions and the organizations can be activated without need of the physical SIM card. It is one of the progressing and confirmed employments of Internet of Things (IoT).

OBJECTIVES: The presented research manuscript is presenting an outline of the present state of IoT security.

METHODS: Past the standard applications, IoT is under research for the earth watching and prior notification to the coordinating workplaces so the fitting moves can be made. As per the news report by Grand View Research Inc., the overall IoT marketplace size is shown to contact more than 5,000 million dollars by year 2025. The presented IoT suggests the radio advancement standard with LPWAN so the enormous consideration of sharp devices should be conceivable with more significant level of execution in the system.

RESULTS: The key positive of the paper integrates the evaluation of Internet of Things with the assorted dimensions in addition to the cavernous analytics with the implementation aspects towards the security mechanism. The paper is having the focus and goals towards the association of security aware mechanism for the cumulative performance of IoT based environment.

CONCLUSION: With the gigantic utilization of IoT, there is have to incorporate the higher level of security and honesty for the protection mindful system condition.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
QA75 Electronic computers. Computer science
Depositing User: EAI Editor II.
Date Deposited: 09 Sep 2020 11:04
Last Modified: 09 Sep 2020 11:04

Actions (login required)

View Item
View Item