Professional Documents
Culture Documents
SeminarPresentation SoumiliBose
SeminarPresentation SoumiliBose
By Soumili Bose
2nd year 4th sem
Information Technology
University of Calcutta
Contents:
Introduction
IoT applications
Communication in IoT
Security and authentication in
IoT
Implementation of
Authentication in IoT
Steps for Authentication
Conclusion
References
Introduction
• What is IoT ?
- The Internet of Things is
actually a pretty simple
concept, it means taking all
the things in the world and
connecting them to the
internet.
IoT Applications
Smart Smart
Agriculture Vehicles
Why do we
need Security in Authentication
IoT ? in IoT:
Step 2: • NS keeps SUCnt i and CMIDi in its database for auditing and
sends Ai and TIDi to Ui securely.
User Registration Phase:
• After receiving Ai and TIDi from the NS, the user generates a
counter USCnt i and initializes it to 0.
• Ui imprints their biometrics template Bi at the smart mobile
device (SMDi).
• The user employs a fuzzy extractor probabilistic function and
calculates Gen(Bi) = (βi, αi), Ki = aes128_cmac(βi,IDi|PW i) and