Security Tools for Internet of Things: A Review

Authors

  • Amandeep Singh Department of Electronics and Communication Engineering, Punjabi University, Patiala Author
  • Dr. Charanjit Singh Department of Electronics and Communication Engineering, Punjabi University, Patiala Author

DOI:

https://doi.org/10.47392/irjash.2020.42

Keywords:

Docker, JCA, Key Management, Mutual Authentication, Token-based Authentication

Abstract

In today’s communications, the main challenging facet is Security of LTE systems in terms of various areas such as mutual authentication, key management, forward and backward secrecy, use of efficient security tools, etc. For proper key management, the generation and distribution of random keys is of main concern which can be done with the help of dynamic security tools. In this paper, main features of security tools like, Docker, Java Cryptography Architecture (JCA), Token-based authentication have been reviewed. Docker provides containerized environment based on application virtualization and also lighter than virtual machines. To define cryptographic concepts and algorithms, JCA cites design patterns and an extensible framework for Java platform. Token-based authentication method or system is used to provide secure user access to server using a token, like smart cards. 

Downloads

Published

2020-06-28