Abstract: Nowadays Internet of Things devices are rapidly developing to support a great deal of end-end devices (E2E) applications and services. But these services require and reliable device authentication for the security of data. Most of the low-cost devices do not include the security mechanisms. This reduces the reliability of the credentials thus leading to the vulnerability. The are many authentication algorithms for normal devices but extending these algorithms to IoT end devices is a difficult task. In this paper we propose an algorithm for the end to end authentication of End-End devices. We use the algorithm called as Alert Correlation Algorithm for the purpose of the authentication of devices. The algorithm uses the hashing method using alphanumeric keys for the security by using cryptography. If any vulnerable user is detected the algorithm generates the alarm and notifies the user. It also stops the data transfer in the network route till the vulnerable user is removed. We use the cloud tool to store the log file data of each and every successful transaction and detected vulnerability. Our work is providing an extended security to the user’s data. Only registered users can transmit data in the channel.

Keywords: Internet of Things (IoT), Cloud, Security, Cryptography, Hashing, Alert Correlation Algorithm

PDF | DOI: 10.17148/IJARCCE.2019.8614

Open chat
Chat with IJARCCE