IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
 M. Rouse & I. Wigmore. (2016). Internet of things. Available at: http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT.
 Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer, & Shahid Khan. (2012). Future internet: The internet of things architecture, possible applications and key challenges. Available at: https://pure.qub.ac.uk/en/publications/future-internet-the-internet-of-things-architecture-possible-appl.
 Janaki Sivakumar, Ammar Yasser,et al. (2013). Intent based security challenges in android-An analysis & recommendation. International Journal of Computer Science and Network Security, 13(1).
 A. K. Sikder, H. Aksu, & A. S. Uluagac. (2017). 6th sense: A context aware sensor-based attack detector for smart devices. In 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 397–414.
 Y. Son, H. Shin, D. Kim, Y.-S. Park, J. Noh, K. Choi, J. Choi, & Y. Kim et al. (2015). Rocking drones with intentional sound noise on gyroscopic sensors. In USENIX Security, pp. 881–896.
 A. Nahapetian. (2016). Side-channel attacks on mobile and wearable systems. In Consumer Communications & Networking Conference, pp. 243–247.
 R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, & X. Wang. (2011). Soundcomber: A stealthy and context-aware sound trojan for smartphones. NDSS, 11, 17–33.
 Janaki Sivakumar & Hameetha Begum. (2017). Integer factorization in RSA encryption: Challenge for cloud attackers. International Journal of Computer Science Trends and Technology, 5(2), 405-408.
 Ammar Yassir, Dr. Priyanka Roy, & Janaki Sivakumar. (2012). Dеsіgnіng а sеcurіty nеtwork for the information tеchnology risk management. International Journal of Advanced Research in Computer and Communication Engineering, 1(9).
 Wahab, A., Ahmad, O., Muhammad, M., & Ali, M. (2017). A comprehensive analysis on the security threats and their countermeasures of IoT. International Journal of Advanced Computer Science and Applications, 8(7), 489-501.
 Pan, Yao, et al. (2017). Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems. International Journal of Interactive Multimedia & Artificial Intelligence, 45-54.
 Kaushal, Kanchan & Varsha Sahni. (2015). DoS attacks on different layers of WSN: A review. International Journal of Computer Applications 130(17), 8-11.
 Sonar, Krushang & Hardik Upadhyay. (2014). A survey: DDOS attack on internet of things. International Journal of Engineering Research and Development, 10(11), 58-63.
 Peris-Lopez, Pedro, et al. (2016). Attacking RFID systems. Available at:
 Nia, Arsalan Mohsen & Niraj K. Jha. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.
 Farooq, M. U., et al. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7), 1-6.
 Doinea, Mihai, et al. (2015). Internet of things based systems for food safety management. Informatica Economica, 19(1), 87.
 Jeyanthi, N., Shreyansh Banthia, & Akhil Sharma. (2017). Security in IoT devices. Security breaches and threat prevention in the internet of things. IGI Global, 96-116.
 Ahuja, S. & Potti, P. (2010). An introduction to RFID technology. Communication Networks, 2, 183–186.
 Domdouzis, K., Kumar, B., & Anumba, C. (2007). Radio-Frequency Identification (RFID) applications: A brief introduction. Advanced Engineering Informatics, 21, 350–355.
 Coltman, T., Gadh, R., & Michael, K. (2008). RFID and supply chain management: Introduction to the special issue. Journal of Theoretical and Applied Electronic Commerce, 3, 3–6.
 Shen, Y., Wang, Z., & Zhou, C. (2008). RFID principle and its application in vehicle. Storage, Transportation & Preservation of Commodities, 30, 44–46.
 Ferrero, R., Gandino, F., Montrucchio, B., Rebaudengo, M., & Zhang, L. (2015). A novel simulator for RFID reader-to-reader anti-collision protocols. In Proceedings of the International EURASIP Workshop on RFID Technology, pp. 59–64.
 Seo, S., Won J., Sultana, S., & Bertino, E. (2015). Effective key management in dynamicwireless sensor networks. IEEE Transactions on Information Forensics and Security, 10, 371–383.
 Levi, A. & Sarimurat, S. (2017). Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context. Ad Hoc Network, 57, 3–18.
 Castiglione, A., Santis, A., & Masucci, B. (2014). Hierarchical and shared key assignment. In Proceedings of the International Conference on Network-Based Information Systems, Salerno, pp. 263–270.
Copyright (c) 2020 International Journal of Engineering and Management Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.