RSP Science Hub
  • Register
  • Login

International Research Journal on Advanced Science Hub

Notice

As part of Open Journals’ initiatives, we create website for scholarly open access journals. If you are responsible for this journal and would like to know more about how to use the editorial system, please visit our website at https://ejournalplus.com or
send us an email to info@ejournalplus.com

We will contact you soon

  1. Home
  2. Volume 2, Issue 6
  3. Authors

Current Issue

By Issue

By Subject

Keyword Index

Author Index

Indexing Databases XML

About Journal

Aims and Scope

Editorial Board

Editorial Staff

Publication Ethics

Indexing and Abstracting

Related Links

FAQ

Peer Review Process

News

Copyright Terms

Editor and Reviewer guidelines

Editorial Process - Peer Reviewed

Digital Archiving & Preservation Policy

Licensing Terms

Security Tools for Internet of Things: A Review

    Amandeep Singh Charanjit Singh

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue 6, Pages 87-91
10.47392/irjash.2020.42

  • Show Article
  • Download
  • Cite
  • Statistics
  • Share

Abstract

In today’s communications, the main challenging facet is Security of LTE systems in terms of various areas such as mutual authentication, key management, forward and backward secrecy, use of efficient security tools, etc. For proper key management, the generation and distribution of random keys is of main concern which can be done with the help of dynamic security tools. In this paper, main features of security tools like, Docker, Java Cryptography Architecture (JCA), Token-based authentication have been reviewed. Docker provides containerized environment based on application virtualization and also lighter than virtual machines. To define cryptographic concepts and algorithms, JCA cites design patterns and an extensible framework for Java platform. Token-based authentication method or system is used to provide secure user access to server using a token, like smart cards.
Keywords:
    Docker JCA Key Management Mutual Authentication Token-based Authentication
  • PDF (169 K)
  • XML
(2020). Security Tools for Internet of Things: A Review. International Research Journal on Advanced Science Hub, 2(6), 87-91. doi: 10.47392/irjash.2020.42
Amandeep Singh; Charanjit Singh. "Security Tools for Internet of Things: A Review". International Research Journal on Advanced Science Hub, 2, 6, 2020, 87-91. doi: 10.47392/irjash.2020.42
(2020). 'Security Tools for Internet of Things: A Review', International Research Journal on Advanced Science Hub, 2(6), pp. 87-91. doi: 10.47392/irjash.2020.42
Security Tools for Internet of Things: A Review. International Research Journal on Advanced Science Hub, 2020; 2(6): 87-91. doi: 10.47392/irjash.2020.42
  • RIS
  • EndNote
  • BibTeX
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Article View: 187
  • PDF Download: 245
  • LinkedIn
  • Twitter
  • Facebook
  • Google
  • Telegram
  • Home
  • Glossary
  • News
  • Aims and Scope
  • Privacy Policy
  • Sitemap
This journal is licensed under a Creative Commons Attribution 4.0 International (CC-BY 4.0)

Powered by eJournalPlus