Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India

Research Article

User Authentication System for Securing and Identifies by User and IoT Device

Download225 downloads
  • @INPROCEEDINGS{10.4108/eai.16-4-2022.2318076,
        author={B. Bamleshwar  Rao and Akhilesh A.  Waoo},
        title={User Authentication System for Securing and Identifies by User and IoT Device},
        proceedings={Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India},
        publisher={EAI},
        proceedings_a={THEETAS},
        year={2022},
        month={6},
        keywords={substitution and permutation network one time password (otp) internet of things (iot) user authentication security in healthcare},
        doi={10.4108/eai.16-4-2022.2318076}
    }
    
  • B. Bamleshwar Rao
    Akhilesh A. Waoo
    Year: 2022
    User Authentication System for Securing and Identifies by User and IoT Device
    THEETAS
    EAI
    DOI: 10.4108/eai.16-4-2022.2318076
B. Bamleshwar Rao1,*, Akhilesh A. Waoo1
  • 1: AKSU, Satna
*Contact email: bamleshwar@gmail.com

Abstract

The primary goal of Secured IoT is to safeguard IoT data from a wide range of security threats and attacks. Data encryption is challenging to implement because of the restricted nature of the Internet of Things devices. the vast majority of users should be able to access IoT data without difficulty. Authenticating IoT people rather than the devices they use is becoming increasingly widespread in the Internet of Things (IoT) security solutions. An understandable fear for patients' safety arises when unauthorized access to data and devices is allowed in the healthcare setting. Transmitting data safely requires that the parties involved maintain the confidentiality of the data they are exchanging. For the protection of Internet of Things data, we proposed using a Lightweight Block Cipher based on a Substitution and Permutation Network (SPN). A block cipher for Internet of Things data security based on the Feistel structure has been created. To protect the information coming from the Internet of Things, develop a hybrid algorithm for generating one-time-use passwords.