Volume 20 No 21 (2022)
 Download PDF
Identity-Based Remote Device Authentication Low-Cost Model and Performance Evaluation: A P2P Approach
Umesh Kumar, Dr. Rishi Kumar Sharma , Dr. Ramesh Vishwakarma
Abstract
It’s a study of network security and auto load balancing that uses remote P2P with M2M techniques to solve the security problems of the Internet of Things (IoT) and Cloud Robotics (IoTCR). Despite the fact that I have introduced many relevant concepts in my work, there isn’t a lot of theoretically sound study on Cloud Robotics (CR). This work focuses on the research on model implementation and evaluation. Firstly, a remote P2P and identity-based remote device authentication system are built as the base for the IoTCR security architecture. This concept eliminate numerous security concerns associated with conventional IoTCR architectures, while also considerably enhancing system performance in distributed large-capacity storage, concurrency, and query. Secondly, the average latency and calculation time are used to assess the performance of the suggested model, which arises for further research and optimization in this field. Analysis and test results demonstrate the effectiveness of the Identity-Based Remote Device Authentication System-Based Security model.
Keywords
It’s a study of network security and auto load balancing that uses remote P2P with M2M techniques to solve the security problems of the Internet of Things (IoT) and Cloud Robotics (IoTCR). Despite the fact that I have introduced many relevant concepts in my work, there isn’t a lot of theoretically sound study on Cloud Robotics (CR). This work focuses on the research on model implementation and evaluation. Firstly, a remote P2P and identity-based remote device authentication system are built as the base for the IoTCR security architecture. This concept eliminate numerous security concerns associated with conventional IoTCR architectures, while also considerably enhancing system performance in distributed large-capacity storage, concurrency, and query. Secondly, the average latency and calculation time are used to assess the performance of the suggested model, which arises for further research and optimization in this field. Analysis and test results demonstrate the effectiveness of the Identity-Based Remote
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.