{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:00Z","timestamp":1767339240051,"version":"3.38.0"},"reference-count":30,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["KES"],"published-print":{"date-parts":[[2021,1,18]]},"abstract":"<jats:p>The entire world is running behind the smart technology to accomplish the daily needs in a smart way such as smart farming, smart irrigation system, smart transportation system, smart medical management, handling of smart home appliances, smart security, etc. Smart technology is the soul property of internet services and accessing data from virtual servers, which raises the alarm of security vulnerability and threats. In recommended system we have focused on application layer security which are concerned with application interface and queue manager for service exchange. As application layer is the closest to end user and produces the big threat to the application platform it motivates us to recommend strong multilevel security system to identify the different activity of handlers and identify their roles to enroute of accessing confidential data services. Subsequently, our work is to assure that every user should have an authentication key with specific privileges to get the desired information. In focus, we see the security management by integrating the Kerberos authentication protocol with honey encryption technique to provide strong multilevel security system.<\/jats:p>","DOI":"10.3233\/kes-190116","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T18:16:26Z","timestamp":1611080186000},"page":"303-309","source":"Crossref","is-referenced-by-count":6,"title":["Integrated security for data transfer and access control using authentication and cryptography technique for Internet of things"],"prefix":"10.1177","volume":"24","author":[{"given":"Santosh Kumar","family":"Sharma","sequence":"first","affiliation":[{"name":"Department of MCA, Vignan\u2019s Institute of Information Technology, Visakhapatnam, AP, India"}]},{"given":"Bonomali","family":"Khuntia","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Berhampur University, Berhampur, Odisha, India"}]}],"member":"179","reference":[{"key":"10.3233\/KES-190116_ref1","doi-asserted-by":"crossref","unstructured":"A. Majeed, Internet of things (IoT): A verification framework, IEEE (2017).","DOI":"10.1109\/CCWC.2017.7868461"},{"key":"10.3233\/KES-190116_ref2","doi-asserted-by":"crossref","unstructured":"B.F. Zahra et al., Risk analysis in the internet of things using EBIOS, IEEE (2017).","DOI":"10.1109\/CCWC.2017.7868444"},{"key":"10.3233\/KES-190116_ref3","doi-asserted-by":"crossref","unstructured":"B. Dorsemaine et al., A new threat assessment method for integration an IoT infrastructure in an information system, IEEE (2017).","DOI":"10.1109\/ICDCSW.2017.22"},{"key":"10.3233\/KES-190116_ref4","doi-asserted-by":"crossref","unstructured":"C. Stergiou et al., Architecture for security monitoring in IoT environments, conference, IEEE (2017).","DOI":"10.1109\/ISIE.2017.8001447"},{"key":"10.3233\/KES-190116_ref5","doi-asserted-by":"crossref","unstructured":"D. Midi et al., A system for knowledge-driven adaptable intrusion detection for the internet of things, IEEE (2017).","DOI":"10.1109\/ICDCS.2017.104"},{"key":"10.3233\/KES-190116_ref6","unstructured":"G. Baldini, E. Fourneret, R. Neisse, B. Legeard and F. Le Gall, Security certification and labelling in internet of things."},{"key":"10.3233\/KES-190116_ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2687618"},{"key":"10.3233\/KES-190116_ref8","doi-asserted-by":"crossref","unstructured":"I. Nakagawa and S. Shimojo, Agent platform mechanism with the transparent cloud computing framework for improving IoT security, IEEE (2017).","DOI":"10.1109\/COMPSAC.2017.156"},{"key":"10.3233\/KES-190116_ref9","doi-asserted-by":"crossref","unstructured":"J. Zouari, M. Hamdi and T. Kim, A privacy-preserving homomorphic encryption scheme for the internet of things, IEEE (2017).","DOI":"10.1109\/IWCMC.2017.7986580"},{"key":"10.3233\/KES-190116_ref10","doi-asserted-by":"crossref","unstructured":"L. Metongnon, Eugene et al., Efficient probing of heterogeneous IoT networks, IFIP (2017).","DOI":"10.23919\/INM.2017.7987437"},{"key":"10.3233\/KES-190116_ref11","doi-asserted-by":"crossref","unstructured":"M. Sain, Y. Kang and H.J. Lee, Survey on security in internet of things: State of the artistic production and challenges, ICACT (2017).","DOI":"10.23919\/ICACT.2017.7890183"},{"key":"10.3233\/KES-190116_ref12","doi-asserted-by":"crossref","unstructured":"M. Mohsin et al., IoTSAT: A formal framework for security analysis of the internet of things (IoT), IEEE (2016).","DOI":"10.1109\/CNS.2016.7860484"},{"key":"10.3233\/KES-190116_ref13","doi-asserted-by":"crossref","unstructured":"M.B. Abderrahim, M.H. Elhdhili and L. Sudan, TMCoI-SIOT: A trust management system based on communities of cyberspace for the Social Internet of Things, IEEE (2017).","DOI":"10.1109\/IWCMC.2017.7986378"},{"key":"10.3233\/KES-190116_ref14","doi-asserted-by":"crossref","unstructured":"M. Nawi et al., Internet of Things (IoT): Taxonomy of security attacks, IEEE (2016).","DOI":"10.1109\/ICED.2016.7804660"},{"key":"10.3233\/KES-190116_ref15","doi-asserted-by":"crossref","unstructured":"M. B. Abderrahim et al., CTMS-SIOT: A context-based trust management system for the social internet of things, IEEE (2017).","DOI":"10.1109\/IWCMC.2017.7986574"},{"key":"10.3233\/KES-190116_ref16","unstructured":"N. Sklavos et al., Cryptography and Security in the Internet of Things (IoT): Models, schemes, and implementations, IEEE (2016)."},{"key":"10.3233\/KES-190116_ref17","doi-asserted-by":"crossref","unstructured":"P. Massonet, L. Deru, A. Levin and M. Villari, End-to-end security architecture for federated cloud and IoT networks, IEEE (2017).","DOI":"10.1109\/SMARTCOMP.2017.7947005"},{"key":"10.3233\/KES-190116_ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"10.3233\/KES-190116_ref19","first-page":"2017","article-title":"Managing IoT devices use blockchain platform","author":"Kim","journal-title":"ICACT"},{"key":"10.3233\/KES-190116_ref20","doi-asserted-by":"crossref","unstructured":"S. Sicari et al., A secure ICN-IoT architecture, IEEE (2017).","DOI":"10.1109\/ICCW.2017.7962667"},{"key":"10.3233\/KES-190116_ref21","doi-asserted-by":"crossref","unstructured":"S. Batool et al., Internet of things data analytics for user authentication and activity recognition, IEEE (2017).","DOI":"10.1109\/FMEC.2017.7946428"},{"key":"10.3233\/KES-190116_ref22","unstructured":"T. Abels, R. Khanna and K. Midkiff, Future proof IoT: Composable semantics, security, QoS and reliability, IEEE (2017)."},{"key":"10.3233\/KES-190116_ref23","doi-asserted-by":"crossref","unstructured":"T. El-Maliki et al., Efficient security adaptation framework for internet of things, IEEE (2016).","DOI":"10.1109\/CSCI.2016.0046"},{"key":"10.3233\/KES-190116_ref24","doi-asserted-by":"crossref","unstructured":"V. Jerald and A. Rabara, Algorithmic approach to security architecture for integrated IoT smart services environment, IEEE (2016).","DOI":"10.1109\/WCCCT.2016.16"},{"key":"10.3233\/KES-190116_ref25","unstructured":"W.Z. Khan et al., Mobile RFID in the internet of things: Security attacks, privacy risks, and countermeasures, IEEE (2016)."},{"key":"10.3233\/KES-190116_ref26","unstructured":"P.L. Gracy and D. Venkatesan, A honey encryption-based efficient security mechanism for wireless sensor networks, IJPAM (2018)."},{"key":"10.3233\/KES-190116_ref27","unstructured":"N.S. Noorunnisa et al., Review on honey encryption technique, IJSR (2018)."},{"key":"10.3233\/KES-190116_ref28","doi-asserted-by":"crossref","unstructured":"A. Juels and T. Ristenpart, Honey encryption: Security beyond the brute-force bound, 2014.","DOI":"10.1007\/978-3-642-55220-5_17"},{"key":"10.3233\/KES-190116_ref29","unstructured":"R. Sahu and M.S. Ansari, Securing messages from brute force attack by combined approach of honey encryption and blowfish, IRJET (2017)."},{"key":"10.3233\/KES-190116_ref30","doi-asserted-by":"crossref","unstructured":"S. Murty and M. Mulchandani, Improving security of honey encryption in database: Implementation, ICSESD (2017).","DOI":"10.24001\/ijaems.icsesd2017.110"}],"container-title":["International Journal of Knowledge-based and Intelligent Engineering Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/KES-190116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T05:12:16Z","timestamp":1741669936000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/KES-190116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,18]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/kes-190116","relation":{},"ISSN":["1327-2314","1875-8827"],"issn-type":[{"type":"print","value":"1327-2314"},{"type":"electronic","value":"1875-8827"}],"subject":[],"published":{"date-parts":[[2021,1,18]]}}}