Token Based Authentication Using IOT
Akshay Hegade1 , Sindhu K. G2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-2 , Page no. 776-779, Feb-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i2.776779
Online published on Feb 28, 2019
Copyright © Akshay Hegade, Sindhu K. G . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Akshay Hegade, Sindhu K. G, “Token Based Authentication Using IOT,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.776-779, 2019.
MLA Style Citation: Akshay Hegade, Sindhu K. G "Token Based Authentication Using IOT." International Journal of Computer Sciences and Engineering 7.2 (2019): 776-779.
APA Style Citation: Akshay Hegade, Sindhu K. G, (2019). Token Based Authentication Using IOT. International Journal of Computer Sciences and Engineering, 7(2), 776-779.
BibTex Style Citation:
@article{Hegade_2019,
author = {Akshay Hegade, Sindhu K. G},
title = {Token Based Authentication Using IOT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {776-779},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3742},
doi = {https://doi.org/10.26438/ijcse/v7i2.776779}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.776779}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3742
TI - Token Based Authentication Using IOT
T2 - International Journal of Computer Sciences and Engineering
AU - Akshay Hegade, Sindhu K. G
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 776-779
IS - 2
VL - 7
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
349 | 261 downloads | 140 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
Token Based Authentication is one of the basic mechanism of login that will be required and used in most of the web applications. The token is prima focus in the whole functionality of the product which can not be decrypted by users.
Key-Words / Index Term
Security,Authentication,Authorization
References
[1] Mrunal A. Mahajan, “An approach for securing SWIPING MACHINE transactions” IJSRCSE, Vol.06 , Special Issue.01 , pp.68-72, Jan-2018
[2] Priyang Bhatt, Bhasker Thaker, Neel Shah, “A Survey on Developing Secure IoT Products”, Isroset-Journal Vol.6 , Issue.5 , pp.41-44, Oct-2018
[3] Jim Stabile, Robert Pang, Mala Anand
Oracle Corporation, “An Authentication Model for a Web Application Server” Sixth International World Wide Web Conference : POS749
[4] OASIS Security Services TC, “Security Assertion Markup Language (SAML) V2.0 Technical Overview” sstc-saml-tech-overview-2.0
[5] Ramanpreet Singh Lamba, “OAUTH – “A NEW ERA IN IDENTITY MANAGEMENT” AND ITS APPLICATIONS” White Paper, External Document, Infosys Limited
[6] Muhamad Haekal, Eliyani, “Token-based authentication using JSON Web Token on SIKASIR RESTful Web Service” ISBN: 978-1-5090-1648-8
[7] Timothy Claeys, Franck Rousseau, Bernard Tourancheau “Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment” hal-01596135