An Authentication Scheme for an IoT Environment using Advanced Multiple Encryption System
M. Sundarrajan1, A.E. Narayanan2

1M.Sundarrajan*, Computer Science and Engineering, Periyar Maniammai Institute of Science & Technology, Thanjavur, India.
2A.E.Narayanan, Computer Science and Engineering, Periyar Maniammai Institute of Science & Technology, Thanjavur, India.

Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 868-874 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4378119119/2019©BEIESP | DOI: 10.35940/ijitee.A4378.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Internet of Things (IoT) has become one of the most important fields of research as it plays a vital role in performing an assigned task with various smart devices. These connected devices work together to achieve a common goal. Numerous researchers have been working in various sectors of IoT for obtaining a betterment in the entire function of an IoT environment. Securing the data being transmitted or stored in these smart devices in one of the major fields of research. Some of the security challenges faced in an IoT environment are in the areas of user authentication, user privacy, access control, information confidentiality, trust, mobile security and policy enforcement. To overcome all these challenges. In this paper, we have proposed a system called AMES (Advanced Multiple Encryption System) which also secures the overall communication of the network. The paper briefs an overview of an IoT environment, consisting of some hackers where the user connection with the controller is blocked without the presence of integrity and confidentiality. The paper also discusses the various security benefits of RSA and SHA. The proposed AMES system is based on Hardy Wall Algorithm and MQTT protocol. The differentiation of the proposed protocol and HTTP protocol is stated clearly The experimental results are obtained for the proposed authentication scheme using NS3 simulator by showing the comparison between existing hybrid security system with our proposed authentication system. The results also state that the designed AMES authentication system using MQTT protocol can minimize the level of security threats and other complications in transmission of the data in IoT environment.
Keywords: Advanced Multiple Encryption System, MQTT, Internet of Things, Authentication, Security
Scope of the Article: Internet of Things