ijarce.org

Journal Archive

    1. Number 1
    1. Number 2
    2. Number 1

NEWS AND EVENTS

25 May 2018

Attention to Authors

 

The Volume 2, Number 1, May 2018 issue of IJARCE has been published and hardcopies have been sent to authors. Notice that, arrival process of the hardcopies, to your addresses, will takes between 20 to 30 days depending on your country of origin.

 

29 November 2016

Attention to Authors

The Volume 1, Number 2, November 2016 issue of IJARCE has been published and hardcopies have been sent to authors. Notice that, arrival process of the hardcopies, to your addresses, will takes between 12 to 30 days depending on your country of origin.

 

- -

Implicit Access to Internet of Things Devices

Artical 24 ; volume2 ; number1 ; Page: 53-58 ; PDF Download

Authors

Piyush Wani, Sheeraaz Shaikh, Priyadarshan Prabhakar, Suryansh Rajan, Nalini A. Mhetre

Smt. Kashibai Navale College of Engineering, Pune, India

Smt. Kashibai Navale College of Engineering, Pune, India

Smt. Kashibai Navale College of Engineering, Pune, India

Smt. Kashibai Navale College of Engineering, Pune, India

Abstract

This paper discusses the design and implementation of easier access to IOT devices and endorses security in the system. To provide access to owner many researchers have made use of technologies like passwords, GPS based authentication, RFID authentication, Wi-Fi, NFC based authentication. To provide security to Internet of Things (IoT) resources the user has to provide the above mentioned credential for proving his identity. This is important to provide security against intruders and malicious intents. But this creates extra effort for user to prove him as an authorized user. We are proposing a system that is efficient itself to identify its true owner and alert him when a malicious attempt of access if made. The system will relieve the user from providing authentication details and provide hassle free access to his IoT devices. The paper will further discuss efficient solution for the security trade-off that would be encountered. The system is based on wireless protocol 802.15.4 Bluetooth which will prove as an identity for user. This Bluetooth signal will be sensed by the reader on the IoT resources and grant access rights to the user. Bluetooth had been evolved through years and latest version is optimized for minimal battery utilization and its influence is limited to few meters making it most suitable signal channel for authentication approvals.

 

Statistics

Article View : 680

PDF Download : 302

Keyword