Open Access   Article Go Back

Token Based Authentication Using IOT

Akshay Hegade1 , Sindhu K. G2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 776-779, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.776779

Online published on Feb 28, 2019

Copyright © Akshay Hegade, Sindhu K. G . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Akshay Hegade, Sindhu K. G, “Token Based Authentication Using IOT,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.776-779, 2019.

MLA Style Citation: Akshay Hegade, Sindhu K. G "Token Based Authentication Using IOT." International Journal of Computer Sciences and Engineering 7.2 (2019): 776-779.

APA Style Citation: Akshay Hegade, Sindhu K. G, (2019). Token Based Authentication Using IOT. International Journal of Computer Sciences and Engineering, 7(2), 776-779.

BibTex Style Citation:
@article{Hegade_2019,
author = {Akshay Hegade, Sindhu K. G},
title = {Token Based Authentication Using IOT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {776-779},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3742},
doi = {https://doi.org/10.26438/ijcse/v7i2.776779}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.776779}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3742
TI - Token Based Authentication Using IOT
T2 - International Journal of Computer Sciences and Engineering
AU - Akshay Hegade, Sindhu K. G
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 776-779
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
349 261 downloads 140 downloads
  
  
           

Abstract

Token Based Authentication is one of the basic mechanism of login that will be required and used in most of the web applications. The token is prima focus in the whole functionality of the product which can not be decrypted by users.

Key-Words / Index Term

Security,Authentication,Authorization

References

[1] Mrunal A. Mahajan, “An approach for securing SWIPING MACHINE transactions” IJSRCSE, Vol.06 , Special Issue.01 , pp.68-72, Jan-2018
[2] Priyang Bhatt, Bhasker Thaker, Neel Shah, “A Survey on Developing Secure IoT Products”, Isroset-Journal Vol.6 , Issue.5 , pp.41-44, Oct-2018
[3] Jim Stabile, Robert Pang, Mala Anand
Oracle Corporation, “An Authentication Model for a Web Application Server” Sixth International World Wide Web Conference : POS749
[4] OASIS Security Services TC, “Security Assertion Markup Language (SAML) V2.0 Technical Overview” sstc-saml-tech-overview-2.0
[5] Ramanpreet Singh Lamba, “OAUTH – “A NEW ERA IN IDENTITY MANAGEMENT” AND ITS APPLICATIONS” White Paper, External Document, Infosys Limited
[6] Muhamad Haekal, Eliyani, “Token-based authentication using JSON Web Token on SIKASIR RESTful Web Service” ISBN: 978-1-5090-1648-8
[7] Timothy Claeys, Franck Rousseau, Bernard Tourancheau “Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment” hal-01596135