sc 20(11): e3

Research Article

Secured Authentication Systems for Internet of Things

Download128 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.163998,
        author={Gowtham M and M. K. Banga and Mallanagouda Patil},
        title={Secured Authentication Systems for Internet of Things},
        journal={EAI Endorsed Transactions on Smart Cities},
        keywords={Internet of Things, IoT, Security Mechanisms, Secured IoT Environment},
  • Gowtham M
    M. K. Banga
    Mallanagouda Patil
    Year: 2020
    Secured Authentication Systems for Internet of Things
    DOI: 10.4108/eai.13-7-2018.163998
Gowtham M1,*, M. K. Banga2, Mallanagouda Patil2
  • 1: Research Scholar, Department of Computer Science and Engineering, NIE Institute of Technology, Mysuru & Dayananda Sagar University, Bangalore, Karnataka, India
  • 2: Department of Computer Science and Engineering, Dayananda Sagar University, Bangalore, Karnataka, India
*Contact email:


INTRODUCTION: In these days, an enormous extent of contraptions are interconnected with the remote advances which gave the principal light to the front line development of Internet of Things (IoT). Different quick contraptions and machines are by and by watched and controlled using IoT conventions. The developments of IoT are by and by spread to the entire sphere by which there is superb system in the devices related using IoT. From the assessment reports of, The closeout of splendid home contraptions raised from 1.2 billion dollars to 4.4 billion dollars from year 2015 to year 2019 in the United States. As indicated by the report from Economics Times, there will connect with more than 2 billion units of ESIM based contraptions by year 2024. With the use of ESIM, the endorsers can use the progressed SIM card for the astute contraptions and the organizations can be activated without need of the physical SIM card. It is one of the progressing and confirmed employments of Internet of Things (IoT).

OBJECTIVES: The presented research manuscript is presenting an outline of the present state of IoT security.

METHODS: Past the standard applications, IoT is under research for the earth watching and prior notification to the coordinating workplaces so the fitting moves can be made. As per the news report by Grand View Research Inc., the overall IoT marketplace size is shown to contact more than 5,000 million dollars by year 2025. The presented IoT suggests the radio advancement standard with LPWAN so the enormous consideration of sharp devices should be conceivable with more significant level of execution in the system.

RESULTS: The key positive of the paper integrates the evaluation of Internet of Things with the assorted dimensions in addition to the cavernous analytics with the implementation aspects towards the security mechanism. The paper is having the focus and goals towards the association of security aware mechanism for the cumulative performance of IoT based environment.

CONCLUSION: With the gigantic utilization of IoT, there is have to incorporate the higher level of security and honesty for the protection mindful system condition.