Loading

Two Way Authentication System in Internet of Things (IOT) For Impersonation Attacks
K. Meena1, Suresh Mundru2

1K. Meena, Associate Professor, Department of Computer Science and Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, (Tamil Nadu), India.
2Suresh Mundru, Research Scholar, Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, (Tamil Nadu), India.

Manuscript received on 13 March 2019 | Revised Manuscript received on 25 March 2019 | Manuscript published on 30 March 2019 | PP: 1411-1414 | Volume-7 Issue-6, March 2019 | Retrieval Number: F3016037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: IoT security is one of the significant issues confronting us in the computerized age. Programmers regularly mimic the client or the specialist co-op to get into a system. This technique is conceivable when no confirmation is performed to check that each gathering is IOT. In this paper, we propose two way confirmation method for maintaining security at every level and also a block chain server is included for recording every action during communication. To begin with we utilize one verification convention named; OAUTH 2 is utilized for IOT/cloud correspondence. Second verification plot is utilized to share a bit of information that is known just to the gatherings included and along these lines is known as a mutual secrecy. Libsecurity executes the common secret component utilizing a one-time secret word (OTP). Libsecurity is a total, little and (provably) adjust security toolbox for things (endpoints) and entryways. It produces a very secure key, in light of the mutual secret joined with time or occasion based data that you can just utilize once. The utilization of the mutual secret gives the verification.
Keywords: Internet of things, programmers, pantomime, oauth2, libsecurity, Block chain

Scope of the Article: IoT.