A Survey on Authentication Schemes in IoT

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Security of devices connected to the internet have recently gained more priority due to cyber-attacks occurring worldwide. Authentication is one of the strongest principles of network security, may it be for small networks such as local servers or for large networks such as central cloud servers. In our research, we try to emphasize on several existing authentication schemes created for constrained devices along with their advantages, disadvantages and primarily their resistance against several attacks. We focus on the resistance of such schemes against the vicious Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.

Original languageEnglish
Title of host publicationProceedings - 2017 International Conference on Information Technology, ICIT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages202-207
Number of pages6
ISBN (Print)9781538629246
DOIs
Publication statusPublished - 31-07-2018
Event16th International Conference on Information Technology, ICIT 2017 - Bhubaneswar, Odisha, India
Duration: 21-12-201723-12-2017

Publication series

NameProceedings - 2017 International Conference on Information Technology, ICIT 2017

Conference

Conference16th International Conference on Information Technology, ICIT 2017
Country/TerritoryIndia
CityBhubaneswar, Odisha
Period21-12-1723-12-17

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Computer Science Applications
  • Software
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'A Survey on Authentication Schemes in IoT'. Together they form a unique fingerprint.

Cite this