Title: Token security for internet of things

Authors: Sudha Narendrakumar; Abdul Razaque; Varil Patel; Muder Almi'ani; Syed S. Rizvi; Akshat Hans

Addresses: Department of Electrical and Computer Engineering, Cleveland State University, OH, USA ' Department of Electrical and Computer Engineering, Cleveland State University, OH, USA ' Department of Electrical and Computer Engineering, Cleveland State University, OH, USA ' Department of Computer Information System, Al-Hussein Bin Talal University, Ma'an, Jordan ' Department of Information Sciences and Technology, Pennsylvania State University, PA, USA ' Department of Electrical and Computer Engineering, Cleveland State University, OH, USA

Abstract: The internet of things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer interconnection over a network. IOT has the potential to provide unlimited benefits in daily life and the number of IOT devices is growing day by day. This scenario leads the internet world to be less secure. Since storage in each device is the main issue, cloud servers are relied upon to store the data. The data is accessed by the registered users for that particular network leading to the problem of security when many devices try to access the same network. Since the generated token has a threat of guessing or cryptanalysis attack, we worked on making it more secure by using cryptanalytics process. The cryptanalytics process is accomplished through the addition of logical operation of the token with OTP and hashing before sending the token to the user and service provider.

Keywords: open authentication; OA; one time password; OTP; hash based message authentication code; HMAC; RSA; SHA relying party; pseudorandom number generator; PRNG; message-digest algorithm; service provider; identity layer.

DOI: 10.1504/IJES.2018.10014927

International Journal of Embedded Systems, 2018 Vol.10 No.4, pp.334 - 343

Received: 30 Apr 2016
Accepted: 07 Nov 2016

Published online: 01 Aug 2018 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article