IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol

IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol

Khuda Bux Jalbani, Akhtar Hussain Jalbani, Saima Siraj Soomro
DOI: 10.4018/978-1-7998-2803-7.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The usage of the internet of things (IoT) devices is growing for the ease of life. From smart homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart highways, these IoT devices send and receive highly sensitive data regarding the privacy of users or other information regarding the movement of users from one location to another location. The timing traces users when present at home and out of the home. But how does one secure this information from the attacker? There is a need for IoT devices security. As there are three layers of IoT devices—the application layer, network layer, and perception layer—three layers to be secure. IoT devices are heterogeneous and constrain energy consumption. The proposed solution in this chapter is three-way authentication of IoT devices by generating tokens from the device serial number and from the few configuration devices at the network layer. For high availability of IoT device services, the protection against distributed denial of service attack is implemented at the network layer.
Chapter Preview
Top

Introduction

The Internet of Things (IoT) usage is growing rapidly to get more benefits from this technology with less interaction by any human. These IoT devices are used for smart homes, smart home appliances, smart cars, safe cities, sensors for medical, smart agriculture devices, and smart highways/motorways for safe roads. The IoT networks can be categorized as distributed, hybrid, universal, and vehicular sensor networks, etc. Sensors are used everywhere, from home security to water level observation of agriculture, from containers tracking to patient's health condition monitoring, from driverless cars to vehicle speed checking on motorways. In the early design of the Internet, security was not considered a major part. Today the same security threats and vulnerabilities are faced with IoT on each layer. Distributed data collection, processing, aggregation and analysis performed on that particular data is mainly performed from cloud services. This data is gathered from the sensors which are deployed as a service. A security breach threat exists, as these IoT devices are deployed at the customer's premises. These devices are not updated timely for the bug fixes in firmware and other required settings for the latest vulnerabilities fixes from vendors.

Key Terms in this Chapter

Integrity: It includes keeping up the consistency, precision, and dependability of information over its whole life cycle.

Cryptography: The change of information into a secret code for transmission over public systems.

Availability: Ensures that systems, applications, and information are accessible to clients when they need them.

Fog Computing: Is a term for a choice to cloud computing that puts a few sorts of exchanges and assets at the edge of a network, as opposed to setting up channels for cloud storage and use.

Authentication: In computing the procedure or activity of confirming the identity of a client or process.

Sensors: A device that reacts to a physical boost, (for example, heat, light, stable, weight, attraction, or a specific movement) and transmits a subsequent impulse (with respect to estimation or working a control).

Security: Is the protection of data systems from burglary or harm to the equipment, the product, and to the data on them, just as from interruption or redirection of the services they give.

Complete Chapter List

Search this Book:
Reset