SlideShare a Scribd company logo
Sanjay Kumar Yadav (206117032)
Guide:- Dr. R. Leela Velusamy
0
Viva Voce Exam-06/04/2022
 The Internet of Things (IoT) devices are wireless
networking devices which can be used with help of
existing infrastructure.
 The uses of IoT devices are increasing exponentially. It is
estimated that by year 2020, 20 billion devices are IoT
devices.
 In most of cases the IoT devices are used without human
involvement.
1
Viva Voce Exam-06/04/2022
 The IoT devices have capacity of computability and
communication.
 The IoT devices are used remotely and without human
intervention so security and authentication become a
major concern.
 The proposed scheme deals with security and
authentication of IoT devices.
 The implementation result show the better output
compared to the existing solution.
2
Viva Voce Exam-06/04/2022
 An authentication model for IoT is presented and the
security challenges are optimized through a secure
signature based authentication and key agreement method.
 The communication efficiency in the proposed scheme has
been increased compared to existing solution.
 The proposed scheme deals with the possible attacks on
IoT network like Denial-of-Service (DoS),
Eavesdropping, Physical damage, Node Capturing.
3
Viva Voce Exam-06/04/2022
 The IoT devices have a ripple effect on Smart Home,
Smart Farm, Smart Transportation, Smart City, Smart
Industry, Medical, E-governance etc.
 The IoT devices are connected to internet and available at
any time, so security threat become a major issue.
 The IoT devices have limited capacity and are
heterogeneous in nature which increases the complexity of
security mechanism.
4
Viva Voce Exam-06/04/2022
 The existing security mechanism of IoT devices are based
on interface protection. The most hardware and software
designer access devices via Application Programming
Interface (API). The interface are protected via wireless
protocol and standers like Constrained Application Protocol
(CoAP), Message Queue Telemetry Transport (MqTT)
protocol etc.
 As IoT security requires an end-to-end approach in the
network design. So, security should be full product-lifecycle
development activity. The most existing solution follow the
security implementation in design phase.
5
Viva Voce Exam-06/04/2022
PROPOSED SOLUTION
6
Viva Voce Exam-06/04/2022
 The IoT has an enormous threat to security and privacy due to
its heterogeneous and dynamic nature.
 Authentication is one of the most important challenging
security requirement in IoT environment.
 Proposed scheme is signature-based authenticated key
establishment for IoT environment.
 Informal security analysis and formal security verification
using broadly accepted automated validation of internet
security protocols and applications.
 The proposed scheme is implemented using NS2simulator.
7
Viva Voce Exam-06/04/2022
Network Formation
New Packet format
creation
Registration Phase
Data Encryption
Authentication
Performance
Analysis
8
Viva Voce Exam-06/04/2022
Network Simulator (NS2)
User IoT
Gateway
System setup phase
Packet Flag Check
Compute Hash Fun
Broadcast Public Key
IOT Authentication of Packet
Packet Encryption
Packet Routing
Select Unique ID
Generate Unique
Certificate
Create Hash
Table
Registration
Request
Returns
Smart Card
ID
User Registration Phase
User Login Phase
Share Hash Table
Authentication
Check
Login
Request
Login Ack
Calculate
Throughput, Energy
Loss, Delay
Gateway
authenticatio
n
Parameter Analysis
Generate Trace File
Dynamic changing of
IOT devices in case of
physical damage of
devices
Packet Routing
9
Viva Voce Exam-06/04/2022
A. SYSTEM SETUP PHASE
Step S1. GWN chooses a non-singular elliptic curve Ep over a
prime finite field Zp, p being a large prime. GWN then selects a
base point P of order n over Ep .GWN also chooses its private
key dGWN and computes the corresponding public key dGWN=
dGWN .P.
Step S2. GWN then chooses a collision-resistant one-way
cryptographic hash function h(.).
Step S3. Finally, the system parameters f(Ep (a,b), P, p, h(.) ) are
made public, whereas dGWN is kept secret by GWN.
10
Viva Voce Exam-06/04/2022
B. SENSING DEVICE REGISTRATION PHASE
All the sensing devices in IoT are registered offline by the GWN
as follows:
Step SD1. For each device SDj, the GWN chooses a unique
identity IDj and a unique private key dj, and calculates the
corresponding public key Qi= dj.P. It further computes RIDj
=h(IDj.|| dj).
Step SD2. The GWN pre-loads { RIDJ, SDj , dj} in the memory of
SDj. Furthermore, the GWN stores {Idj, RIDJ, Qj} in its database,
and then makes Qj as public.
11
Viva Voce Exam-06/04/2022
C. USER REGISTRATION PHASE
A user Ui registers with the GWN by executing the following
steps:
Step R1. Ui chooses a unique IDi, a unique private key di
and calculates the corresponding public key Qi = di.P. Ui
sends registration request message with RIDi= h(IDi.|| di)
to GWN via a secure channel.
Step R2. GWN computes Ri D h(RIDi ||GWNd ), stores it
on smart card SCi and sends it to Ui via a secure channel.
12
Viva Voce Exam-06/04/2022
D.AUTHENTICATION PHASE
In this phase if any node receives a message or request from any
other nodes, it is checked that either received message or request
is from authenticated node or not. The authentication phase
implemented in Ad-hoc on Demand Vector (AODV.cc) file of
NS2.
Step A1- The index of request certificate calculated by using
function Ii = RDi %N where Ii is index of ith node, RDi is request id of
ith device, and N is total number of nodes in the network.
Step A2- The index value is searched in certificate matrix table.
If the value is present at Index Ii is equal to certificate of request
then request or message is accepted otherwise dropped.
13
Viva Voce Exam-06/04/2022
Parameter Description
Platform Ubuntu 14.04 LTS
Network scenario NS2
RAM 2 GB
Space Capacity 256 MB
No of nodes in network 26
No of gateways 1 for all scenario
Mobility 2 mps for network one only remaining
no mobility
Simulation Time 19 seconds
Initial Energy for each node 1800
14
Viva Voce Exam-06/04/2022
 Screenshot1:-
15
Viva Voce Exam-06/04/2022
 Screenshot2:-
16
Viva Voce Exam-06/04/2022
 Screenshot3:-
17
Viva Voce Exam-06/04/2022
 Screenshot4:-
18
Viva Voce Exam-06/04/2022
Existing scheme Proposed Scheme
Number of
Nodes
5 15 26 5 15 26
Allocated
MPR Set
4 12 18 4 12 18
Generated
Packets
101 143 167 101 143 167
Received
Packets
96 121 110 99 139 147
Packets Loss 5 22 57 2 5 20
Packet
Delivery
Ratio (%)
95 84.62 65.87 98.01 97.20 88.02
End-To-End
Delay (ms)
56.5 69.44 143.67 20.72 23.68 61.16
Throughput
(bits/sec)
5.05 6.37 5.78 5.21 7.31 7.73
19
Viva Voce Exam-06/04/2022
 End-To-End Delay-graph
20
Viva Voce Exam-06/04/2022
 Throughput-Graph
21
Viva Voce Exam-06/04/2022
 Packet delivery ratio
22
Viva Voce Exam-06/04/2022
• This proposed scheme deals with an authentication model
for IoT applications and security challenges.
• It addresses the security and authentication challenges of
IoT devices.
• It deals with the network protection from various attacks,
decreases the computation complexity and increases the
communication efficiency.
• It performs better in terms of throughput, packet delivery
ratio, and end to end delay when compared to existing
solution.
23
Viva Voce Exam-06/04/2022
 Chang-Seop Park, Wang-Seok Park “A Group-Oriented DTLS
Handshake for secure IoT Applications”, 2018 IEEE
Transactions on Automation Science and Engineering, Vol 15,
1920-1929, August 2018.
• Gyozo Godor, Norbert Giczi and Sandore Imre “Elliptic curve
cryptography based mutual authentication protocol for low
computational capacity RFID systems - performance analysis
by simulations ”, 2010 IEEE International Conference on
Wireless Communications, Networking and Information
Security, vol 2, 25-29, Jan 2010.
 Mandeep Kumar, Ketan Sable, S.Mini and Trilichan Panigrahi
“Priority based deployment of IoT devices ”, 2018
International Conference on IoT and Application (ICIOT), vol
2, 10-16, April 2018.
24
Viva Voce Exam-06/04/2022
 Michelle S. Henriques and Nagaraj K. Vernekar “Using
symmetric and asymmetric cryptography to secure
communication between devices in IoT”, 2017 International
Conference on IoT and Application (ICIOT), vol 2, 28-35, May
2017
 Peng Xu, Shuanghon He and Wei Wang “Lightweight
Searchable Public-Key Encryption for Cloud-Assisted Wireless
Sensor Networks” 2017 IEEE Transactions on industrial
informatics, Vol 18, 12-20, August 2018.
 Shravani challa, Mohammad Wazid, Ashok Kumar Das,Neeraj
Kumar,Eun-Jun Yoo and Keen Yong Yoo “Secure Signature-
Based Authenticated Key Establishment Scheme For Future
IoT Applications”, IEEE System journel, vol 11, no 2, 106-115,
June 2016
25
Viva Voce Exam-06/04/2022
 Weishan Zhang, Wuwu Guo Xin Liu and Yan Lu “LSTM-
Based Analysis of Industrial IoT Equipment” 2018 IEEE
International Conference on Wireless Communications,
Networking and Information, Vol 3, 12-24, Feb 2018.
 Junse Wang, Ning Cao and Hongbin Zhang “Trust and
Atrribute-Based Dynamic Access Control Model for
Internet Of Things”,2017 International Conference on
Cyber-Enabled Distributed Computing and Knowledge
Descovery (CyberC), Vol 4, 16-26, Oct 2017.
26
Viva Voce Exam-06/04/2022
THANK YOU
27
Viva Voce Exam-06/04/2022
Ad

More Related Content

What's hot (20)

Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)
Monica Kambala
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
Ramana Reddy
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
AYESHA JAVED
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Kunal Thakur
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Internet of things
Internet of thingsInternet of things
Internet of things
Vikrant Negi
 
IoT ppt
IoT pptIoT ppt
IoT ppt
Muthulakshmi97
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
Ashutosh Bhardwaj
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Akanksha Prasad
 
Internet Of Things(IOT)
Internet Of Things(IOT)Internet Of Things(IOT)
Internet Of Things(IOT)
sameergupta85
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 
Smart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracerSmart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracer
KhyathiNandankumar
 
IoT Security
IoT SecurityIoT Security
IoT Security
Narudom Roongsiriwong, CISSP
 
Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)
Monica Kambala
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
Ramana Reddy
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
AYESHA JAVED
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
Chintan Patel
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Internet of things
Internet of thingsInternet of things
Internet of things
Vikrant Negi
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
Ashutosh Bhardwaj
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Akanksha Prasad
 
Internet Of Things(IOT)
Internet Of Things(IOT)Internet Of Things(IOT)
Internet Of Things(IOT)
sameergupta85
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Smart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracerSmart Home Using IOT simulation In cisco packet tracer
Smart Home Using IOT simulation In cisco packet tracer
KhyathiNandankumar
 

Similar to Security and Authentication of Internet of Things (IoT) Devices (20)

IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
IRJET Journal
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
Manipal University Jaipur
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
IRJET Journal
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
ijwscjournal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
IRJET Journal
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
GICTTraining
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
ishwar69
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
Internet of things: Trends, Direction Opportunities of 2020
Internet of things: Trends, Direction Opportunities of 2020Internet of things: Trends, Direction Opportunities of 2020
Internet of things: Trends, Direction Opportunities of 2020
Sandeep Gaikwad
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
IRJET Journal
 
internet-of-things-5.........................pdf
internet-of-things-5.........................pdfinternet-of-things-5.........................pdf
internet-of-things-5.........................pdf
rajeswaria21
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET Journal
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET Journal
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICESA LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
A LIGHTWEIGHT PAYMENT VERIFICATION USING BLOCKCHAIN ALGORITHM ON IoT DEVICES
IRJET Journal
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
IRJET Journal
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET Journal
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
IRJET Journal
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
ijwscjournal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
IRJET Journal
 
Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
GICTTraining
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
ishwar69
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
Internet of things: Trends, Direction Opportunities of 2020
Internet of things: Trends, Direction Opportunities of 2020Internet of things: Trends, Direction Opportunities of 2020
Internet of things: Trends, Direction Opportunities of 2020
Sandeep Gaikwad
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
Using Natural Language Processing(NLP), Voice Recognition and Internet of Thi...
IRJET Journal
 
internet-of-things-5.........................pdf
internet-of-things-5.........................pdfinternet-of-things-5.........................pdf
internet-of-things-5.........................pdf
rajeswaria21
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...IRJET-  	  Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET Journal
 
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET Journal
 
Ad

Recently uploaded (20)

Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
Guru Nanak Technical Institutions
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...
IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...
IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...
ssuserd9338b
 
VISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated detailsVISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated details
Vishal Kumar Singh
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
David Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And Python
David Boutry
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Optimizing Reinforced Concrete Cantilever Retaining Walls Using Gases Brownia...
Journal of Soft Computing in Civil Engineering
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
speedcomcyber25
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...
OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...
OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...
ijdmsjournal
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Understand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panelUnderstand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panel
NaveenBotsa
 
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
Guru Nanak Technical Institutions
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...
IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...
IPC-7711D-7721D_ EN 2023 TOC Rework, Modification and Repair of Electronic As...
ssuserd9338b
 
VISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated detailsVISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated details
Vishal Kumar Singh
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
David Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And PythonDavid Boutry - Specializes In AWS, Microservices And Python
David Boutry - Specializes In AWS, Microservices And Python
David Boutry
 
Deepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber ThreatsDeepfake Phishing: A New Frontier in Cyber Threats
Deepfake Phishing: A New Frontier in Cyber Threats
RaviKumar256934
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
speedcomcyber25
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...
OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...
OPTIMIZING DATA INTEROPERABILITY IN AGILE ORGANIZATIONS: INTEGRATING NONAKA’S...
ijdmsjournal
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Understand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panelUnderstand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panel
NaveenBotsa
 
Ad

Security and Authentication of Internet of Things (IoT) Devices

  • 1. Sanjay Kumar Yadav (206117032) Guide:- Dr. R. Leela Velusamy 0 Viva Voce Exam-06/04/2022
  • 2.  The Internet of Things (IoT) devices are wireless networking devices which can be used with help of existing infrastructure.  The uses of IoT devices are increasing exponentially. It is estimated that by year 2020, 20 billion devices are IoT devices.  In most of cases the IoT devices are used without human involvement. 1 Viva Voce Exam-06/04/2022
  • 3.  The IoT devices have capacity of computability and communication.  The IoT devices are used remotely and without human intervention so security and authentication become a major concern.  The proposed scheme deals with security and authentication of IoT devices.  The implementation result show the better output compared to the existing solution. 2 Viva Voce Exam-06/04/2022
  • 4.  An authentication model for IoT is presented and the security challenges are optimized through a secure signature based authentication and key agreement method.  The communication efficiency in the proposed scheme has been increased compared to existing solution.  The proposed scheme deals with the possible attacks on IoT network like Denial-of-Service (DoS), Eavesdropping, Physical damage, Node Capturing. 3 Viva Voce Exam-06/04/2022
  • 5.  The IoT devices have a ripple effect on Smart Home, Smart Farm, Smart Transportation, Smart City, Smart Industry, Medical, E-governance etc.  The IoT devices are connected to internet and available at any time, so security threat become a major issue.  The IoT devices have limited capacity and are heterogeneous in nature which increases the complexity of security mechanism. 4 Viva Voce Exam-06/04/2022
  • 6.  The existing security mechanism of IoT devices are based on interface protection. The most hardware and software designer access devices via Application Programming Interface (API). The interface are protected via wireless protocol and standers like Constrained Application Protocol (CoAP), Message Queue Telemetry Transport (MqTT) protocol etc.  As IoT security requires an end-to-end approach in the network design. So, security should be full product-lifecycle development activity. The most existing solution follow the security implementation in design phase. 5 Viva Voce Exam-06/04/2022
  • 8.  The IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature.  Authentication is one of the most important challenging security requirement in IoT environment.  Proposed scheme is signature-based authenticated key establishment for IoT environment.  Informal security analysis and formal security verification using broadly accepted automated validation of internet security protocols and applications.  The proposed scheme is implemented using NS2simulator. 7 Viva Voce Exam-06/04/2022
  • 9. Network Formation New Packet format creation Registration Phase Data Encryption Authentication Performance Analysis 8 Viva Voce Exam-06/04/2022
  • 10. Network Simulator (NS2) User IoT Gateway System setup phase Packet Flag Check Compute Hash Fun Broadcast Public Key IOT Authentication of Packet Packet Encryption Packet Routing Select Unique ID Generate Unique Certificate Create Hash Table Registration Request Returns Smart Card ID User Registration Phase User Login Phase Share Hash Table Authentication Check Login Request Login Ack Calculate Throughput, Energy Loss, Delay Gateway authenticatio n Parameter Analysis Generate Trace File Dynamic changing of IOT devices in case of physical damage of devices Packet Routing 9 Viva Voce Exam-06/04/2022
  • 11. A. SYSTEM SETUP PHASE Step S1. GWN chooses a non-singular elliptic curve Ep over a prime finite field Zp, p being a large prime. GWN then selects a base point P of order n over Ep .GWN also chooses its private key dGWN and computes the corresponding public key dGWN= dGWN .P. Step S2. GWN then chooses a collision-resistant one-way cryptographic hash function h(.). Step S3. Finally, the system parameters f(Ep (a,b), P, p, h(.) ) are made public, whereas dGWN is kept secret by GWN. 10 Viva Voce Exam-06/04/2022
  • 12. B. SENSING DEVICE REGISTRATION PHASE All the sensing devices in IoT are registered offline by the GWN as follows: Step SD1. For each device SDj, the GWN chooses a unique identity IDj and a unique private key dj, and calculates the corresponding public key Qi= dj.P. It further computes RIDj =h(IDj.|| dj). Step SD2. The GWN pre-loads { RIDJ, SDj , dj} in the memory of SDj. Furthermore, the GWN stores {Idj, RIDJ, Qj} in its database, and then makes Qj as public. 11 Viva Voce Exam-06/04/2022
  • 13. C. USER REGISTRATION PHASE A user Ui registers with the GWN by executing the following steps: Step R1. Ui chooses a unique IDi, a unique private key di and calculates the corresponding public key Qi = di.P. Ui sends registration request message with RIDi= h(IDi.|| di) to GWN via a secure channel. Step R2. GWN computes Ri D h(RIDi ||GWNd ), stores it on smart card SCi and sends it to Ui via a secure channel. 12 Viva Voce Exam-06/04/2022
  • 14. D.AUTHENTICATION PHASE In this phase if any node receives a message or request from any other nodes, it is checked that either received message or request is from authenticated node or not. The authentication phase implemented in Ad-hoc on Demand Vector (AODV.cc) file of NS2. Step A1- The index of request certificate calculated by using function Ii = RDi %N where Ii is index of ith node, RDi is request id of ith device, and N is total number of nodes in the network. Step A2- The index value is searched in certificate matrix table. If the value is present at Index Ii is equal to certificate of request then request or message is accepted otherwise dropped. 13 Viva Voce Exam-06/04/2022
  • 15. Parameter Description Platform Ubuntu 14.04 LTS Network scenario NS2 RAM 2 GB Space Capacity 256 MB No of nodes in network 26 No of gateways 1 for all scenario Mobility 2 mps for network one only remaining no mobility Simulation Time 19 seconds Initial Energy for each node 1800 14 Viva Voce Exam-06/04/2022
  • 20. Existing scheme Proposed Scheme Number of Nodes 5 15 26 5 15 26 Allocated MPR Set 4 12 18 4 12 18 Generated Packets 101 143 167 101 143 167 Received Packets 96 121 110 99 139 147 Packets Loss 5 22 57 2 5 20 Packet Delivery Ratio (%) 95 84.62 65.87 98.01 97.20 88.02 End-To-End Delay (ms) 56.5 69.44 143.67 20.72 23.68 61.16 Throughput (bits/sec) 5.05 6.37 5.78 5.21 7.31 7.73 19 Viva Voce Exam-06/04/2022
  • 21.  End-To-End Delay-graph 20 Viva Voce Exam-06/04/2022
  • 23.  Packet delivery ratio 22 Viva Voce Exam-06/04/2022
  • 24. • This proposed scheme deals with an authentication model for IoT applications and security challenges. • It addresses the security and authentication challenges of IoT devices. • It deals with the network protection from various attacks, decreases the computation complexity and increases the communication efficiency. • It performs better in terms of throughput, packet delivery ratio, and end to end delay when compared to existing solution. 23 Viva Voce Exam-06/04/2022
  • 25.  Chang-Seop Park, Wang-Seok Park “A Group-Oriented DTLS Handshake for secure IoT Applications”, 2018 IEEE Transactions on Automation Science and Engineering, Vol 15, 1920-1929, August 2018. • Gyozo Godor, Norbert Giczi and Sandore Imre “Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations ”, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, vol 2, 25-29, Jan 2010.  Mandeep Kumar, Ketan Sable, S.Mini and Trilichan Panigrahi “Priority based deployment of IoT devices ”, 2018 International Conference on IoT and Application (ICIOT), vol 2, 10-16, April 2018. 24 Viva Voce Exam-06/04/2022
  • 26.  Michelle S. Henriques and Nagaraj K. Vernekar “Using symmetric and asymmetric cryptography to secure communication between devices in IoT”, 2017 International Conference on IoT and Application (ICIOT), vol 2, 28-35, May 2017  Peng Xu, Shuanghon He and Wei Wang “Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks” 2017 IEEE Transactions on industrial informatics, Vol 18, 12-20, August 2018.  Shravani challa, Mohammad Wazid, Ashok Kumar Das,Neeraj Kumar,Eun-Jun Yoo and Keen Yong Yoo “Secure Signature- Based Authenticated Key Establishment Scheme For Future IoT Applications”, IEEE System journel, vol 11, no 2, 106-115, June 2016 25 Viva Voce Exam-06/04/2022
  • 27.  Weishan Zhang, Wuwu Guo Xin Liu and Yan Lu “LSTM- Based Analysis of Industrial IoT Equipment” 2018 IEEE International Conference on Wireless Communications, Networking and Information, Vol 3, 12-24, Feb 2018.  Junse Wang, Ning Cao and Hongbin Zhang “Trust and Atrribute-Based Dynamic Access Control Model for Internet Of Things”,2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Descovery (CyberC), Vol 4, 16-26, Oct 2017. 26 Viva Voce Exam-06/04/2022
  • 28. THANK YOU 27 Viva Voce Exam-06/04/2022
  翻译: