Corpus ID: 212593349

Multifactor Authentication in IoT devices for ensuring secure cloud storage in Smart Banking

@inproceedings{Aravindhan2018MultifactorAI,
  title={Multifactor Authentication in IoT devices for ensuring secure cloud storage in Smart Banking},
  author={S. Aravindhan},
  year={2018}
}
1, 2 Department of Computer Science and Engineering, SNS College of Technology, Coimbatore, Tamil Nadu, India. ----------------------------------------------------------------------------***----------------------------------------------------------------------------Abstract: Internet of things is an analytics system that allow users to achieve deeper automation, analysis, and integration within a system. It has the ability to process and learn from the data provided by the sensors in real world… Expand

References

SHOWING 1-10 OF 13 REFERENCES
A multi-factors security key generation mechanism for IoT
TLDR
The proposed security key generation mechanism enables user to define and choose any physical and logical parameters he/she prefers, in generating a set of security keys to be encrypted and distributed to registered IoT nodes. Expand
Improving the security of internet of things using encryption algorithms
TLDR
A hybrid encryption algorithm is proposed which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity in IOT. Expand
Alternative Security Options in the 5G and IoT Era
TLDR
This article serves as a short but comprehensive introduction to various technologies and cryptographic techniques in the area of lightweight cryptography in the quest to address the security challenges in the IoT and 5G-connectivity era. Expand
Is there a room for security and privacy in IoT?
  • E. Tabane, T. Zuva
  • Computer Science
  • 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE)
  • 2016
TLDR
A survey into the security aspect of IoT is presented, triggered by number of both digital and physical objects connecting to each other using ICT technologies, platforms and the internet to facilitate the whole processes of connectivity and services provision. Expand
Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption
TLDR
Analysis of Asymmetric key encryption or public key encryption on that private and public keys are used in the encryption level on cloud to determine which is efficient in that way of approach. Expand
Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud
TLDR
The identity and attribute based signcryption algorithm is proposed to enhance the security of storage and sharing of remote data and the security properties and the access efficiencies of proposed algorithm are compared with known methods. Expand
Security techniques for cloud computing environment
TLDR
This paper proposes a system on two different protocols i.e. AES & DES and compares the results on both protocols to make the system secure enough on both sides i. Expand
An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internet of things (IOT)
TLDR
Here AES-AES cascading is done which consist of 5 rounds instead of 10, thus it will omit the mix column twice from the original AES Encryption technique, which will reduce the complexity from 248 to 216. Expand
Finger print authentication for improved Cloud Security
  • N. Venakatesan, M. Kumar
  • Computer Science
  • 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
  • 2016
TLDR
The process of combining traditional user-id and password mechanism along with bio metric image processing technique-finger print recognition is thoroughly explored for improving security in public cloud infrastructure. Expand
Alternative Security Options in 5G and IoT Era”,IEEE circuits and system Magazine,2017
  • 2017
...
1
2
...