SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1307
Multifactor Authentication in IoT devices for ensuring secure cloud
storage in Smart Banking
1 Monaswarnalakshmi S.R, 2 Sai Aravindhan. C. P
1, 2 Department of Computer Science and Engineering, SNS College of Technology, Coimbatore, Tamil Nadu, India.
----------------------------------------------------------------------------***-----------------------------------------------------------------------------
Abstract: Internet of things is an analytics system that allow
users to achieve deeper automation, analysis, and integration
within a system. It has the ability to process and learnfromthe
data provided by the sensors in real world. The data collected
by the sensors are stored in cloud for processing.Cloudsystems
are prone to security attacks and also have less amount of
privacy, so that the IoT devices can be hackedbyintruders.IOT
security is the area that is considered for safeguarding the the
devices connected in the network. The main problem is
security is not considered while designing the devices and its
lead to a serious of loss in data privacy.
This problem is solved by improving the privacy of
both IoT devices and Cloud. This is done with the help of Multi-
factor authentication. User who is trying to connect to the IOT
device should authenticate the device first and then only the
connection to that device with a network is established
successfully.
Apart from authentication the data is encrypted for
gaining more security. The algorithm used to encrypt thedata
is AES/RSA algorithm. Thus providing more secured
environment to the consumers. The Multi-factor
authentication is the process of securing the data storedinthe
cloud by means of more than two security layer patches. The
user can be able to access the data and the IOT device only
after authenticating the security layers.
Keywords: IOT, Multi-factor Authentication, RSA, AES.
Abbreviation:
IoT-Internet of Things
RSA-Rivest Shamir Adleman
AES-Advanced Encryption Standard
1. INTRODUCTION
IoT concept can be explained by term ‘device to device
communication’. The device can sense, communicate and
connect to other devices which is connected to internet by
recognizing the physical address assigned to the devicesand
can also share information between them. IoT is a rapidly
developing technology on which the future life will rely
upon. IoT will become the most used technology in every
field around 2025. So, there is a urgent need to provide
security to IoT for securing the data in cloud.
The IoT refers to the use of intelligently connected device
and systems to gather large amount of data. IoT is expected
to spread rapidly over the upcoming years. The IoT has the
potential to deliver solution that dramatically improve
energy efficiency, security, health,education,andmanyother
aspects of our daily life clearly the internet of thingsisoneof
the most important and powerful development. The key
attribute that distinguish from regular way of using internet
and IOT is by using the sense framework.
Imagine that all the devices are connected in internet and
programmed to share information and data, which they can
perform this process automatically to make our routine life
in a different way, which we had only dreamt of it. This
dream can be emerged asa new upcomingtechnologywhere
there is a possibility of communication between electronic
devices
The most commonly used frameworks for IOT is
 OCF- Open Connectivity Foundation.
 OMA- Open Mobile Alliance
 XSF- XMPP Standard Foundation.
 FDA- Food and Drug Administration
 GS1.
 Auto- ID labs.
 EPCglobal.
1.1 Features of IoT:
 Device to device communication.
 Real-Time data management.
 Access control.
 Tele health.
 Transportation management system.
 Traffic control system.
 Environmental monitoring and control.
1.2 Advantages of IoT:
 The work load of human is reduced.
 Automation processwill be helpful so that thework
to be done, can be finished automatically bytheEnd
devices.
 Less man power is needed.
 Smart manufacturing.
 Smart transportation.
 Smart city.
 Smart energy buildings.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1308
2. LITERATURE REVIEW
2.1 Technology overview
The Internet of Things is an emerging technology in a day to
day daily life by making all the works easier than it already
was. Tracking towards the security of this technology is not
that much developed when comparing it with the
performance. Thus, the security is a great threat for most of
the fields in which the IOT is underplayed.
As more and more IoT devices make their way into the
world, deployed in uncontrolled and complexenvironments,
securing IoT systems presents a number of unique
challenges. The top 10 challenges for IOT security are
 Secure constrained devices
 Authorize and authenticate devices
 Manage device updates
 Secure communication
 Ensure data privacy and integrity
 Secure web, mobile, and cloud applications
 Ensure high availability
 Detect vulnerabilities and incidents
 Manage vulnerabilities
 Predict and preempt security issues
Considering on the Secure Constrained Devices, Many IoT
devices have limited amounts of storage, memory, and
processing capability and they often need to be able to
operate on lower power, for example, when running on
batteries. Security approaches that rely heavily on
encryption are not a good fit for these constrained devices,
because they are not capable of performing complex
encryption and decryption quickly enough to be able to
transmit data securely in real-time.
These devices are often vulnerable to side channel attacks,
such as power analysis attacks, that can be used to reverse
engineer these algorithms. Instead, constrained devices
typically only employ fast, lightweight encryption
algorithms.
Considering upon Authorize and authenticate devices, many
devices offering potential points of failure within an IoT
system, device authentication andauthorizationiscriticalfor
securing IoT systems.
Devices must establish their identity before they can access
gateways and upstream services and apps. However, there
are many IoT devices that fall down when it comes to device
authentication, for example, by using weak basic password
authentication, or using passwords unchanged from their
default values.
Adopting an IoT Platform that provides security by default
helps to resolve these issues, for example by enabling two
factor authentication (2FA) and enforcing the use of strong
passwordsor certificates. IoT Platformsalso provide device
authorization services used to determine which services,
apps, or resourcesthat each device has access to throughout
the system.
Considering on Managing the device Updates, including
security patches, to firmware or software that runs on IoT
devices and gateways presents a number of challenges. For
example, you need to keep track of which updates are
available apply updates consistently across distributed
environmentswith heterogeneousdevicesthatcommunicate
through a range of different networking protocols. Not all
devices support over-the-air updates, or updates without
downtime, so devices might need to be physically accessed
or temporarily pulled from production to apply updates.
Also, updates might not be available for all devices,
particularly older devicesor those devices thatarenolonger
supported by their manufacturer.
Device manager systems often support pushingout updates
automatically to devicesaswell as managing rollbacksif the
update process fails. They can also help to ensure that only
legitimate updates are applied, for example through the use
of digital signing.
In secure communication, Once the devices themselves are
secured, the next IoT security challenge is to ensure that
communication across the network between devices and
cloud services or apps is secure.
Many IoT devices don’t encrypt messages before sending
them over the network. However, best practice is to use
transport encryption, and to adopt standardslikeTLS.Using
separate networks to isolate devices also helps with
establishing secure, private communication, so that data
transmitted remains confidential.
In data privacy and Integrity wherever thedataendsupafter
it has been transmitted across the network, it is stored and
processed securely. Implementing data privacy includes
redacting or anonymizing sensitivedata beforeitisstoredor
using data separation to decouple personally identifiable
information from IoT data payloads. Data that is no longer
required should be disposed of securely, andifdataisstored,
maintaining compliance with legal and regulatory
frameworks is also an important challenge.
Ensuring data integrity, which may involve employing
checksums or digital signatures to ensure data has not been
modified. Block chain – as a decentralized distributedledger
for IoT data – offers a scalable and resilient approach for
ensuring the integrity of IoT data.
In Securing the Application, the availability of IoT data and
the web and mobile apps that rely on that data as well asour
access to the physical things managed by IoT systems. The
potential for disruption asa result of connectivityoutagesor
device failures, or arising as a result of attacks like denial of
service attacks, is more than just inconvenience. In some
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1309
applications, the impact of the lack of availabilitycouldmean
loss of revenue, damage to equipment, or even loss of life.
IoT infrastructure is responsible for essential services such
as traffic control, and in healthcare, IoT devices include
pacemakers and insulin pumps. To ensure high availability,
IoT devices must be protected against cyber-attacks as well
asphysical tampering. IoT systemsmustincluderedundancy
to eliminate single points of failure, and should also be
designed to be resilient and fault tolerant, so that they can
adapt and recover quickly when problems do arise.
Detecting Vulnerabilities and breaches include monitoring
network communications and activity logs for anomalies,
engaging in penetration testing andethicalhackingtoexpose
vulnerabilities, and applying security intelligence and
analytics to identify and notify when incidents occur.
Detected Vulnerabilities have to bemanagedandshouldtake
a respective action to manage its extent. Device managers
maintain a register of devices, which can be used to
temporarily disable or isolate affected devicesuntil theycan
be patched. This feature is particularly important for key
devices such as gateway devices in order to limit their
potential to cause harm or disruption, for example, by
flooding the system with fake data if they have been
compromised. Actions can be applied automatically using a
rules engine with rules based on vulnerability management
policies.
A longer-term IoT security challenge is to apply security
intelligence not only for detecting and mitigating issues as
they occur, but also to predict and proactively protect
against potential security threats. Threat modeling is one
approach used to predict security issues. Other approaches
include applying monitoring and analyticstools to correlate
events and visualize unfolding threats in real-time,aswellas
applying AI to adaptively adjust security strategies applied
based on the effectiveness of previous actions.
2.2 Overview of the Secured Smart Banking
The IoT is used in banking sectorsfor making all thebanking
process easier than any time before. But the main threat in
consideration of banking is the security which is dealing
from the very first. The security consideration on the data
and user information about the account detailscan be safely
stored in cloud and can also be connected to any IoT devices
by implementing Multi-Factor Authentication and also by
encrypting the data of all the bank users. Thus by doing so,
will implement a high security patch and make the intruders
impossible to patch the data and user information.
The user can trust the devices and can start transaction or
can carry out any other bank function with less
consideration on loss of privacy data by doing that.
This process will take a external server for storing all the
Authentication details in a secure way and once on
successful authentication the user can access the data or
devices connected in the network.
Fig - 1: Overview of secured smart banking
3. PROPOSED WORK
As illustrated above, the security in Smart Banking Systemis
achieved by means of developing a mobile application. The
functionality of the Application can be accessed only if the
user authenticates all the security patch level. The data
stored in the cloud will be encrypted so that if any intruders
peep out of the authentication will also be made useless if
the data is encrypted. This can be done with the help of AES
algorithm. Firstly, the IoT devices can be accessed only after
the clearance of the multi-factor authentication through
mobile application. The various multi-factor includes –
biometric, OTP, smart card, Strong passwords, etc. Then the
user can access and operate the IoT devices safely without
the intervention of the intruder.
Then the data from the devices are sent to the cloud for
processing. The cloud is also prone to security and hence
cloud servers and private cloud has to be secured.
Secondly, cloud servers are secured with 2 different
biometric types for 2 persons at a time. As well as theprivate
cloud can be secured with multi-factor authentication. The
data that is sent for processing from IoT devices to the cloud
can be transformed in a secured way with the help of AES
algorithm. The AES algorithm uses has three rounds namely
SubBytes, ShiftRows, Mix columns.
This project will be helpful in improving the regular banking
transaction to smart and secured one. It aims to reduce the
security breaches and thus providing a safe and secure
banking experience to the people.
This implementation can be done with the help of mobile
application for the accessing of the data fromtheIoTdevices.
This can be linked with cloud storage for knowing the
current status of the data from the devices.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1310
Fig - 2: AES flow diagram
3.1 Mobile app information
The mobile application can be opened only when the multi-
factor authentication is successful and thus having access to
the IoT devices and also the cloud. Password for the app
should be entered, if the password is correct, an OTP
password will be sent to the registered mobile number.
Fig - 3: First step in authentication
Fig - 4: Second step in authentication
The user has to enter the correct and recent OTP. The OTP
generation can be done using the Transactionalsmsinwhich
there isno need for the entered number to be activatedDND.
(Do Not Disturb) Then the next step of authentication is the
biometric level, i.e. with the help of fingerprint. This can be
developed by creating the instance for the Fingerprint
Manager class and call the authenticate() method.
Fig - 5: Third step in authentication
Most of the device not supported in fingerprint
sensor and this works on phones with the API level above
23. Once the biometric is completed then the end of
multifactor authentication. This improves the security to a
vast extent and difficult for the intruder to gain access to the
important data.
3.2 Advantages
- By using this application, the hackers who seek for
the privacy data of others can be stopped.
- The decryption will be not a easy processunlessthe
private key is available.
- The data will be securely accessed only by
successful authentication of multi-factor process.
4. Conclusion
This system will be useful in safeguarding the bank account
details and the transaction details of a user from many
intruders in the network. This system will also take the
security level of IoT devices to a next level, that by making
the security of the devices stronger than before and giving
consideration to IoT devices to be manufactured with
security updates for many future purposes.
5. References:
[1] Rohan H.Shah, D.P.Salapurkar,”A Multifactor
authentication system using secret splitting in the
perspective of Cloud of Things”,IEEE International
conference on Emerging Trends & Innovation in ICT,2017.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1311
[2] Prachi Garg, Sandeep Goel, Avinash Sharma, “Security
techniques for cloud computing environment”, IEEE
conference on computing, communication and
automation,2017.
[3] N.Venkatesh, M.Rathan Kumar, ”Fingerprint
authentication for improved cloud security”, IEEE
international conference on computing system and
information technology for sustainable solutions,2016.
[4]N.Jayapandian, A.M.J.Md.Zubair Rahman, S.Radhikadevi,
M.Koushikaa,”Enhanced cloud security framework to
confirm data security on asymmetric and symmetric key
encryption”, IEEE world conference on Futuristic Trends in
Research and Innovation for Social welfare,2016.
[5] Xin Pei, Yongjian Wang, Wei Yao, Jiuchuan Lin, Ruxiang
Peng, ”Security Enhanced Attribute Based Signcryption for
Private Data Sharing in Cloud”, IEEE
Trustcom/BigDataSE/ISPA,2016.
[6] Dimitris Schinianakis, ”AlternativeSecurityOptionsin5G
and IoT Era”,IEEE circuits and system Magazine,2017.
[7] Elias Tabane, Tranos Zuva, ”Is there a room for security
and privacy in IoT?”, IEEE International conference on
Advances in Computing and Communications
Engineering(ICACCE),2016.
[8] Kan-Siew-Leong, Paul Loh Ruen Chze, Ang Khoon Wee,
Elizabeth Sim, Kan Ee May,”A multi-factors security key
generation mechanisms for IoT”,IEEE 9th International
Conference on Ubiquitous and Future
Networks(ICUFN),2017.
[9] Ritambhara, Alka Gupta, Manjit Jaiswal,”An enhanced
AES algorithm using cascading method on 400 bits key size
used in enhancing the safety of next generation internert
ofthings(IOT)”,IEEE International Conference on
Computing,Communication and Automation(ICCCA),2017.
[10] Afsoon Yousefi, Seyed Mahdi Jameii,”Improving the
security of internet of things using encryption
algorithms”,IEEE International Conference on IoT and
Application(ICIOT),2017.
[11] rafiullah khan,sarmad ulla khan,rifaqat zaheer,shahid
khan,”future internet: the internet of things architecture,
possible applications and key challenges”.

More Related Content

PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
PDF
Security in IoT
PDF
IRJET- Authentication and Context Awareness Access Control in Internet of Things
PPTX
Security in IoT
PPTX
Security for iot and cloud aug 25b 2017
PDF
An Internet of Things Reference Architecture
PDF
Security Architecture for Small Branch and IoT
PPTX
Iot Security
IRJET- Enhanced SIT Algorithm for Embedded Systems
Security in IoT
IRJET- Authentication and Context Awareness Access Control in Internet of Things
Security in IoT
Security for iot and cloud aug 25b 2017
An Internet of Things Reference Architecture
Security Architecture for Small Branch and IoT
Iot Security

What's hot (20)

PDF
Cybersecurity: A Manufacturers Guide by Clearnetwork
PPTX
Presentation on IOT SECURITY
PPTX
IoT Security
PPTX
IoT security presented in Ada's List Conference
PPTX
Introduction to IOT security
PDF
IoT Security Challenges and Solutions
PDF
Will Internet of Things (IoT) be secure enough?
PDF
IoT Security Challenges
DOCX
Security and Privacy considerations in Internet of Things
PDF
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
PPTX
security and privacy-Internet of things
PPTX
Introduction to IoT Security
 
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
A survey in privacy and security in Internet of Things IOT
PPTX
Presentation on IOT (Internet Of Things)
PDF
IRJET - A Study on Smart Way for Securing IoT Devices
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PPTX
Security issues and solutions : IoT
PPTX
Internet & iot security
PPTX
Internet of things security "Hardware Security"
Cybersecurity: A Manufacturers Guide by Clearnetwork
Presentation on IOT SECURITY
IoT Security
IoT security presented in Ada's List Conference
Introduction to IOT security
IoT Security Challenges and Solutions
Will Internet of Things (IoT) be secure enough?
IoT Security Challenges
Security and Privacy considerations in Internet of Things
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
security and privacy-Internet of things
Introduction to IoT Security
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
A survey in privacy and security in Internet of Things IOT
Presentation on IOT (Internet Of Things)
IRJET - A Study on Smart Way for Securing IoT Devices
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Security issues and solutions : IoT
Internet & iot security
Internet of things security "Hardware Security"
Ad

Similar to IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud Storage in Smart Banking (20)

PDF
509286-Aki_Koivu-Review
PPTX
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
PDF
A Survey Report on : Security & Challenges in Internet of Things
PDF
Io t security_review_blockchain_solutions
DOCX
Addressing security and privacy in io t ecosystem v0.4
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
DOCX
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
PPTX
Assign 1_8812814ctm.pptx
PDF
assignment help experts
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
PDF
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
PDF
Security Aspects in IoT - A Review
PDF
White Paper: IoT Security – Protecting the Networked Society
PDF
sample assignment
PDF
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
PDF
Security Issues in IoT-Based Environments
PDF
Security and Privacy Big Challenges in Internet of things
PDF
A survey on Internet of Things (IoT) security : Challenges and Current status
PDF
May 2021: Top 10 Read Articles in Network Security and Its Applications
509286-Aki_Koivu-Review
Not IN Cybersecurity Connectivity,Cloud Platforms,Security.pptx
A Survey Report on : Security & Challenges in Internet of Things
Io t security_review_blockchain_solutions
Addressing security and privacy in io t ecosystem v0.4
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
Assign 1_8812814ctm.pptx
assignment help experts
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
Security Aspects in IoT - A Review
White Paper: IoT Security – Protecting the Networked Society
sample assignment
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
Security Issues in IoT-Based Environments
Security and Privacy Big Challenges in Internet of things
A survey on Internet of Things (IoT) security : Challenges and Current status
May 2021: Top 10 Read Articles in Network Security and Its Applications
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Geodesy 1.pptx...............................................
PPT
Mechanical Engineering MATERIALS Selection
PPTX
additive manufacturing of ss316l using mig welding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Internet of Things (IOT) - A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
Lecture Notes Electrical Wiring System Components
ETO & MEO Certificate of Competency Questions and Answers
Lesson 3_Tessellation.pptx finite Mathematics
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
Model Code of Practice - Construction Work - 21102022 .pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Geodesy 1.pptx...............................................
Mechanical Engineering MATERIALS Selection
additive manufacturing of ss316l using mig welding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud Storage in Smart Banking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1307 Multifactor Authentication in IoT devices for ensuring secure cloud storage in Smart Banking 1 Monaswarnalakshmi S.R, 2 Sai Aravindhan. C. P 1, 2 Department of Computer Science and Engineering, SNS College of Technology, Coimbatore, Tamil Nadu, India. ----------------------------------------------------------------------------***----------------------------------------------------------------------------- Abstract: Internet of things is an analytics system that allow users to achieve deeper automation, analysis, and integration within a system. It has the ability to process and learnfromthe data provided by the sensors in real world. The data collected by the sensors are stored in cloud for processing.Cloudsystems are prone to security attacks and also have less amount of privacy, so that the IoT devices can be hackedbyintruders.IOT security is the area that is considered for safeguarding the the devices connected in the network. The main problem is security is not considered while designing the devices and its lead to a serious of loss in data privacy. This problem is solved by improving the privacy of both IoT devices and Cloud. This is done with the help of Multi- factor authentication. User who is trying to connect to the IOT device should authenticate the device first and then only the connection to that device with a network is established successfully. Apart from authentication the data is encrypted for gaining more security. The algorithm used to encrypt thedata is AES/RSA algorithm. Thus providing more secured environment to the consumers. The Multi-factor authentication is the process of securing the data storedinthe cloud by means of more than two security layer patches. The user can be able to access the data and the IOT device only after authenticating the security layers. Keywords: IOT, Multi-factor Authentication, RSA, AES. Abbreviation: IoT-Internet of Things RSA-Rivest Shamir Adleman AES-Advanced Encryption Standard 1. INTRODUCTION IoT concept can be explained by term ‘device to device communication’. The device can sense, communicate and connect to other devices which is connected to internet by recognizing the physical address assigned to the devicesand can also share information between them. IoT is a rapidly developing technology on which the future life will rely upon. IoT will become the most used technology in every field around 2025. So, there is a urgent need to provide security to IoT for securing the data in cloud. The IoT refers to the use of intelligently connected device and systems to gather large amount of data. IoT is expected to spread rapidly over the upcoming years. The IoT has the potential to deliver solution that dramatically improve energy efficiency, security, health,education,andmanyother aspects of our daily life clearly the internet of thingsisoneof the most important and powerful development. The key attribute that distinguish from regular way of using internet and IOT is by using the sense framework. Imagine that all the devices are connected in internet and programmed to share information and data, which they can perform this process automatically to make our routine life in a different way, which we had only dreamt of it. This dream can be emerged asa new upcomingtechnologywhere there is a possibility of communication between electronic devices The most commonly used frameworks for IOT is  OCF- Open Connectivity Foundation.  OMA- Open Mobile Alliance  XSF- XMPP Standard Foundation.  FDA- Food and Drug Administration  GS1.  Auto- ID labs.  EPCglobal. 1.1 Features of IoT:  Device to device communication.  Real-Time data management.  Access control.  Tele health.  Transportation management system.  Traffic control system.  Environmental monitoring and control. 1.2 Advantages of IoT:  The work load of human is reduced.  Automation processwill be helpful so that thework to be done, can be finished automatically bytheEnd devices.  Less man power is needed.  Smart manufacturing.  Smart transportation.  Smart city.  Smart energy buildings.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1308 2. LITERATURE REVIEW 2.1 Technology overview The Internet of Things is an emerging technology in a day to day daily life by making all the works easier than it already was. Tracking towards the security of this technology is not that much developed when comparing it with the performance. Thus, the security is a great threat for most of the fields in which the IOT is underplayed. As more and more IoT devices make their way into the world, deployed in uncontrolled and complexenvironments, securing IoT systems presents a number of unique challenges. The top 10 challenges for IOT security are  Secure constrained devices  Authorize and authenticate devices  Manage device updates  Secure communication  Ensure data privacy and integrity  Secure web, mobile, and cloud applications  Ensure high availability  Detect vulnerabilities and incidents  Manage vulnerabilities  Predict and preempt security issues Considering on the Secure Constrained Devices, Many IoT devices have limited amounts of storage, memory, and processing capability and they often need to be able to operate on lower power, for example, when running on batteries. Security approaches that rely heavily on encryption are not a good fit for these constrained devices, because they are not capable of performing complex encryption and decryption quickly enough to be able to transmit data securely in real-time. These devices are often vulnerable to side channel attacks, such as power analysis attacks, that can be used to reverse engineer these algorithms. Instead, constrained devices typically only employ fast, lightweight encryption algorithms. Considering upon Authorize and authenticate devices, many devices offering potential points of failure within an IoT system, device authentication andauthorizationiscriticalfor securing IoT systems. Devices must establish their identity before they can access gateways and upstream services and apps. However, there are many IoT devices that fall down when it comes to device authentication, for example, by using weak basic password authentication, or using passwords unchanged from their default values. Adopting an IoT Platform that provides security by default helps to resolve these issues, for example by enabling two factor authentication (2FA) and enforcing the use of strong passwordsor certificates. IoT Platformsalso provide device authorization services used to determine which services, apps, or resourcesthat each device has access to throughout the system. Considering on Managing the device Updates, including security patches, to firmware or software that runs on IoT devices and gateways presents a number of challenges. For example, you need to keep track of which updates are available apply updates consistently across distributed environmentswith heterogeneousdevicesthatcommunicate through a range of different networking protocols. Not all devices support over-the-air updates, or updates without downtime, so devices might need to be physically accessed or temporarily pulled from production to apply updates. Also, updates might not be available for all devices, particularly older devicesor those devices thatarenolonger supported by their manufacturer. Device manager systems often support pushingout updates automatically to devicesaswell as managing rollbacksif the update process fails. They can also help to ensure that only legitimate updates are applied, for example through the use of digital signing. In secure communication, Once the devices themselves are secured, the next IoT security challenge is to ensure that communication across the network between devices and cloud services or apps is secure. Many IoT devices don’t encrypt messages before sending them over the network. However, best practice is to use transport encryption, and to adopt standardslikeTLS.Using separate networks to isolate devices also helps with establishing secure, private communication, so that data transmitted remains confidential. In data privacy and Integrity wherever thedataendsupafter it has been transmitted across the network, it is stored and processed securely. Implementing data privacy includes redacting or anonymizing sensitivedata beforeitisstoredor using data separation to decouple personally identifiable information from IoT data payloads. Data that is no longer required should be disposed of securely, andifdataisstored, maintaining compliance with legal and regulatory frameworks is also an important challenge. Ensuring data integrity, which may involve employing checksums or digital signatures to ensure data has not been modified. Block chain – as a decentralized distributedledger for IoT data – offers a scalable and resilient approach for ensuring the integrity of IoT data. In Securing the Application, the availability of IoT data and the web and mobile apps that rely on that data as well asour access to the physical things managed by IoT systems. The potential for disruption asa result of connectivityoutagesor device failures, or arising as a result of attacks like denial of service attacks, is more than just inconvenience. In some
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1309 applications, the impact of the lack of availabilitycouldmean loss of revenue, damage to equipment, or even loss of life. IoT infrastructure is responsible for essential services such as traffic control, and in healthcare, IoT devices include pacemakers and insulin pumps. To ensure high availability, IoT devices must be protected against cyber-attacks as well asphysical tampering. IoT systemsmustincluderedundancy to eliminate single points of failure, and should also be designed to be resilient and fault tolerant, so that they can adapt and recover quickly when problems do arise. Detecting Vulnerabilities and breaches include monitoring network communications and activity logs for anomalies, engaging in penetration testing andethicalhackingtoexpose vulnerabilities, and applying security intelligence and analytics to identify and notify when incidents occur. Detected Vulnerabilities have to bemanagedandshouldtake a respective action to manage its extent. Device managers maintain a register of devices, which can be used to temporarily disable or isolate affected devicesuntil theycan be patched. This feature is particularly important for key devices such as gateway devices in order to limit their potential to cause harm or disruption, for example, by flooding the system with fake data if they have been compromised. Actions can be applied automatically using a rules engine with rules based on vulnerability management policies. A longer-term IoT security challenge is to apply security intelligence not only for detecting and mitigating issues as they occur, but also to predict and proactively protect against potential security threats. Threat modeling is one approach used to predict security issues. Other approaches include applying monitoring and analyticstools to correlate events and visualize unfolding threats in real-time,aswellas applying AI to adaptively adjust security strategies applied based on the effectiveness of previous actions. 2.2 Overview of the Secured Smart Banking The IoT is used in banking sectorsfor making all thebanking process easier than any time before. But the main threat in consideration of banking is the security which is dealing from the very first. The security consideration on the data and user information about the account detailscan be safely stored in cloud and can also be connected to any IoT devices by implementing Multi-Factor Authentication and also by encrypting the data of all the bank users. Thus by doing so, will implement a high security patch and make the intruders impossible to patch the data and user information. The user can trust the devices and can start transaction or can carry out any other bank function with less consideration on loss of privacy data by doing that. This process will take a external server for storing all the Authentication details in a secure way and once on successful authentication the user can access the data or devices connected in the network. Fig - 1: Overview of secured smart banking 3. PROPOSED WORK As illustrated above, the security in Smart Banking Systemis achieved by means of developing a mobile application. The functionality of the Application can be accessed only if the user authenticates all the security patch level. The data stored in the cloud will be encrypted so that if any intruders peep out of the authentication will also be made useless if the data is encrypted. This can be done with the help of AES algorithm. Firstly, the IoT devices can be accessed only after the clearance of the multi-factor authentication through mobile application. The various multi-factor includes – biometric, OTP, smart card, Strong passwords, etc. Then the user can access and operate the IoT devices safely without the intervention of the intruder. Then the data from the devices are sent to the cloud for processing. The cloud is also prone to security and hence cloud servers and private cloud has to be secured. Secondly, cloud servers are secured with 2 different biometric types for 2 persons at a time. As well as theprivate cloud can be secured with multi-factor authentication. The data that is sent for processing from IoT devices to the cloud can be transformed in a secured way with the help of AES algorithm. The AES algorithm uses has three rounds namely SubBytes, ShiftRows, Mix columns. This project will be helpful in improving the regular banking transaction to smart and secured one. It aims to reduce the security breaches and thus providing a safe and secure banking experience to the people. This implementation can be done with the help of mobile application for the accessing of the data fromtheIoTdevices. This can be linked with cloud storage for knowing the current status of the data from the devices.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1310 Fig - 2: AES flow diagram 3.1 Mobile app information The mobile application can be opened only when the multi- factor authentication is successful and thus having access to the IoT devices and also the cloud. Password for the app should be entered, if the password is correct, an OTP password will be sent to the registered mobile number. Fig - 3: First step in authentication Fig - 4: Second step in authentication The user has to enter the correct and recent OTP. The OTP generation can be done using the Transactionalsmsinwhich there isno need for the entered number to be activatedDND. (Do Not Disturb) Then the next step of authentication is the biometric level, i.e. with the help of fingerprint. This can be developed by creating the instance for the Fingerprint Manager class and call the authenticate() method. Fig - 5: Third step in authentication Most of the device not supported in fingerprint sensor and this works on phones with the API level above 23. Once the biometric is completed then the end of multifactor authentication. This improves the security to a vast extent and difficult for the intruder to gain access to the important data. 3.2 Advantages - By using this application, the hackers who seek for the privacy data of others can be stopped. - The decryption will be not a easy processunlessthe private key is available. - The data will be securely accessed only by successful authentication of multi-factor process. 4. Conclusion This system will be useful in safeguarding the bank account details and the transaction details of a user from many intruders in the network. This system will also take the security level of IoT devices to a next level, that by making the security of the devices stronger than before and giving consideration to IoT devices to be manufactured with security updates for many future purposes. 5. References: [1] Rohan H.Shah, D.P.Salapurkar,”A Multifactor authentication system using secret splitting in the perspective of Cloud of Things”,IEEE International conference on Emerging Trends & Innovation in ICT,2017.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1311 [2] Prachi Garg, Sandeep Goel, Avinash Sharma, “Security techniques for cloud computing environment”, IEEE conference on computing, communication and automation,2017. [3] N.Venkatesh, M.Rathan Kumar, ”Fingerprint authentication for improved cloud security”, IEEE international conference on computing system and information technology for sustainable solutions,2016. [4]N.Jayapandian, A.M.J.Md.Zubair Rahman, S.Radhikadevi, M.Koushikaa,”Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption”, IEEE world conference on Futuristic Trends in Research and Innovation for Social welfare,2016. [5] Xin Pei, Yongjian Wang, Wei Yao, Jiuchuan Lin, Ruxiang Peng, ”Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud”, IEEE Trustcom/BigDataSE/ISPA,2016. [6] Dimitris Schinianakis, ”AlternativeSecurityOptionsin5G and IoT Era”,IEEE circuits and system Magazine,2017. [7] Elias Tabane, Tranos Zuva, ”Is there a room for security and privacy in IoT?”, IEEE International conference on Advances in Computing and Communications Engineering(ICACCE),2016. [8] Kan-Siew-Leong, Paul Loh Ruen Chze, Ang Khoon Wee, Elizabeth Sim, Kan Ee May,”A multi-factors security key generation mechanisms for IoT”,IEEE 9th International Conference on Ubiquitous and Future Networks(ICUFN),2017. [9] Ritambhara, Alka Gupta, Manjit Jaiswal,”An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internert ofthings(IOT)”,IEEE International Conference on Computing,Communication and Automation(ICCCA),2017. [10] Afsoon Yousefi, Seyed Mahdi Jameii,”Improving the security of internet of things using encryption algorithms”,IEEE International Conference on IoT and Application(ICIOT),2017. [11] rafiullah khan,sarmad ulla khan,rifaqat zaheer,shahid khan,”future internet: the internet of things architecture, possible applications and key challenges”.