Reference Hub4
IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol

IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol

Khuda Bux Jalbani, Akhtar Hussain Jalbani, Saima Siraj Soomro
ISBN13: 9781799828037|ISBN10: 1799828034|ISBN13 Softcover: 9781799828044|EISBN13: 9781799828051
DOI: 10.4018/978-1-7998-2803-7.ch006
Cite Chapter Cite Chapter

MLA

Jalbani, Khuda Bux, et al. "IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol." Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital, edited by Pardeep Kumar, et al., IGI Global, 2020, pp. 98-118. https://doi.org/10.4018/978-1-7998-2803-7.ch006

APA

Jalbani, K. B., Jalbani, A. H., & Soomro, S. S. (2020). IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol. In P. Kumar, V. Ponnusamy, & V. Jain (Eds.), Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital (pp. 98-118). IGI Global. https://doi.org/10.4018/978-1-7998-2803-7.ch006

Chicago

Jalbani, Khuda Bux, Akhtar Hussain Jalbani, and Saima Siraj Soomro. "IoT Security: To Secure IoT Devices With Two-Factor Authentication by Using a Secure Protocol." In Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital, edited by Pardeep Kumar, Vasaki Ponnusamy, and Vishal Jain, 98-118. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2803-7.ch006

Export Reference

Mendeley
Favorite

Abstract

The usage of the internet of things (IoT) devices is growing for the ease of life. From smart homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart highways, these IoT devices send and receive highly sensitive data regarding the privacy of users or other information regarding the movement of users from one location to another location. The timing traces users when present at home and out of the home. But how does one secure this information from the attacker? There is a need for IoT devices security. As there are three layers of IoT devices—the application layer, network layer, and perception layer—three layers to be secure. IoT devices are heterogeneous and constrain energy consumption. The proposed solution in this chapter is three-way authentication of IoT devices by generating tokens from the device serial number and from the few configuration devices at the network layer. For high availability of IoT device services, the protection against distributed denial of service attack is implemented at the network layer.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.