Research Article
Secured Authentication Systems for Internet of Things
@ARTICLE{10.4108/eai.13-7-2018.163998, author={Gowtham M and M. K. Banga and Mallanagouda Patil}, title={Secured Authentication Systems for Internet of Things}, journal={EAI Endorsed Transactions on Smart Cities}, volume={4}, number={11}, publisher={EAI}, journal_a={SC}, year={2020}, month={4}, keywords={Internet of Things, IoT, Security Mechanisms, Secured IoT Environment}, doi={10.4108/eai.13-7-2018.163998} }
- Gowtham M
M. K. Banga
Mallanagouda Patil
Year: 2020
Secured Authentication Systems for Internet of Things
SC
EAI
DOI: 10.4108/eai.13-7-2018.163998
Abstract
INTRODUCTION: In these days, an enormous extent of contraptions are interconnected with the remote advances which gave the principal light to the front line development of Internet of Things (IoT). Different quick contraptions and machines are by and by watched and controlled using IoT conventions. The developments of IoT are by and by spread to the entire sphere by which there is superb system in the devices related using IoT. From the assessment reports of Statista.com, The closeout of splendid home contraptions raised from 1.2 billion dollars to 4.4 billion dollars from year 2015 to year 2019 in the United States. As indicated by the report from Economics Times, there will connect with more than 2 billion units of ESIM based contraptions by year 2024. With the use of ESIM, the endorsers can use the progressed SIM card for the astute contraptions and the organizations can be activated without need of the physical SIM card. It is one of the progressing and confirmed employments of Internet of Things (IoT).
OBJECTIVES: The presented research manuscript is presenting an outline of the present state of IoT security.
METHODS: Past the standard applications, IoT is under research for the earth watching and prior notification to the coordinating workplaces so the fitting moves can be made. As per the news report by Grand View Research Inc., the overall IoT marketplace size is shown to contact more than 5,000 million dollars by year 2025. The presented IoT suggests the radio advancement standard with LPWAN so the enormous consideration of sharp devices should be conceivable with more significant level of execution in the system.
RESULTS: The key positive of the paper integrates the evaluation of Internet of Things with the assorted dimensions in addition to the cavernous analytics with the implementation aspects towards the security mechanism. The paper is having the focus and goals towards the association of security aware mechanism for the cumulative performance of IoT based environment.
CONCLUSION: With the gigantic utilization of IoT, there is have to incorporate the higher level of security and honesty for the protection mindful system condition.
Copyright © 2020 Gowtham M et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.