Detection of Intruders in IoT Networks Using Interloper Software Based on Authentication
Ch Mohan Kumar1, T Rahul Ratna2, S Geethika3, S Uday Kiran4

1Ch Mohan Kumar, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Guntur (Andhra Pradesh), India
2T Rahul Ratna, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Guntur (Andhra Pradesh), India
3S Geethika, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Guntur (Andhra Pradesh), India
4S Uday Kiran, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Guntur (Andhra Pradesh), India
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 814-818 | Volume-8 Issue-6, April 2019 | Retrieval Number: F3698048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Present day, we are using different types of IOT devices say both wired and wireless. In this paper we mainly concentrate on wireless devices which will be connected in a network, we call it internet. This phenomenon is nothing but internet of things. There are vulnerabilities for networks and the devices which can be compromised by using attacks. These vulnerabilities has raised the importance for the data protection. This situation is to be dealt with Intrusion detection system. So we need an IDS to check for the authentication and maintaining security of the data. IDS acts as a bridge between the IOT devices and Internet. This IDS comprises of a device along with a software to check for authentication. Final goal of this paper is to achieve a secured IOT network. Identification and Authentication play an important role in this process.
Keyword: IoT, ARP Spoofing, MITM attack, Fog Computing, DNS, IOT Attacks, and IoT Protocols.
Scope of the Article: IoT