Loading

Applications, Attacks and Authentication Schemes for Future IoT
M. Savitha1, M. Senthilkumar2

1Mrs. M. Savitha*, Research Scholar, Department of Computer Science, Government Arts College, Udumalpet, India.
Dr. M. Senthilkumar , Assistant Professor, Department of Computer Science, Government Arts and Science College, Avinashi, India
Manuscript received on January 11, 2020. | Revised Manuscript received on January 24, 2020. | Manuscript published on February 10, 2020. | PP: 2841-2848 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1875029420/2020©BEIESP | DOI: 10.35940/ijitee.D1875.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The internet has gently penetrated and completely mushroomed in to our entire life activities. Still we give the impression to be extremely unimaginable about real fact for the reason that we are overflowing with the need for internet. This evolution has ended up in the necessity of extensive technological advancement. One among them is the concept of Internet of Things (IoT). IoT is a framework of computing appliances that are interrelated with the purpose of exchanging data over the network. Internet of Things is a structure in which day by day gadgets have turned up shrewder which in turn makes it possible for the each day operations to be smart and communications to be instructive. Any significant influence in the progress of the Internet of Things is essentially the consequence of the deeds that work together for a superior outcome conducted in various domains like social science, electronics, informatics and telecommunications. Consequently, this broad range of applications of IoT causes enormous volume of data sharing which in turn distributes the confidential data pertaining to the users. Hence the need for authentication of IoT devices is of significance to defend against the security attacks. In this paper, a detailed survey of Internet of Things which offers a comprehensive focus on the theory, architecture, applications and related research is presented.
Keywords: Internet of Things, Biometric, Security, RFID, Authentication, Bio-Inspired
Scope of the Article: Internet of Things (IoT)