Author:
Rao B Bamleshwar,Waoo Akhilesh A
Abstract
Advancements in technology have led to the invention of outfits, and the number of devices is increasing every day. Diligence is introducing new devices day by day and prognosticating that 50 billion devices will be connected by 2022. These devices are stationed through the Internet, called the Internet of Things (IoT). The operation of IoT devices is weather prediction, covering surgery in hospitals, identification of creatures using biochips, furnishing shadowing connectivity in motorcars, smart home appliances, etc. IoT devices have limitations related to security at both the software and hardware ends. In the IoT paradigm, Internet-connected embedded devices manipulate sensitive user-related data and require acceptable security results.The security results designed for network-enabled embedded devices must address issues like vacuity and usability, taking into consideration the low computational capabilities and low consumption conditions of IoT appliances. Authentication is the process of vindicating a reality’s identity. Best security practices state that authentication protocol should involve at least two different types of credentials. Authentication in IoT is a bit challenging because the realities involved in the IoT terrain cannot afford to include cryptographic savages which have high computational complexity as in the traditional internet. The most recent secure hash algorithm fashion formalized by the NIST is SHA-3. SHA-3 is fully appropriate to ensure authentication for a sender and receiver transaction. The presented paper includes a deep literature review on IoT security issues and proposes a new modified hash algorithm, which is more efficient in device communication security.
Publisher
Granthaalayah Publications and Printers
Reference60 articles.
1. “Method of Resource-limited Device and Device Class Identification Using System and Function Call Tracing Techniques, Performance, and Statistical Analysis,” Patent 10 242 193.
2. K. Sikder, L. Babun, H. Aksu, and A. S. Uluagac, “Aegis: A Context-Aware Security Framework for Smart Home Systems,” ser. ACSAC 2019.
3. Kabulov, I. Saymanov, I. Yarashov and F. Muxammadiev, "Algorithmic method of security of the Internet of Things based on steganographic coding," 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021, pp. 1-5, doi: 10.1109/IEMTRONICS52119.2021.9422588.
4. Sultan, M. S. Arshad Malik, and A. Mushtaq, “Internet of Things security issues and their solutions with blockchain technology characteristics: A systematic literature review,'' Amer. J. Comput. Sci. Inf. Technol., vol. 6, no. 3, p. 27, 2018.
5. Wang, "Internet of Things Computer Network Security and Remote Control Technology Application," 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), 2020, pp. 1814-1817, doi: 10.1109/ICMCCE51767.2020.00398.