<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sarvesh Chopra</string-name>
          <email>er.sarveshchopra@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Amritpal Singh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Aman Singh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Authentication</institution>
          ,
          <addr-line>Security, Client Authentication, JSON Web Token, THJWT call authentication</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science, Lovely Professional University</institution>
          ,
          <addr-line>Punjab</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Faculty of Engineering, Universidade</institution>
          ,
          <addr-line>Cuito-Bie</addr-line>
          ,
          <country country="AO">Angola</country>
        </aff>
      </contrib-group>
      <fpage>13</fpage>
      <lpage>27</lpage>
      <abstract>
        <p>Information and Communication Technology (ICT) integrates multiple devices and applications that are connected directly to the Internet communications. The development of customer server systems in technology, such as IoT based, cloud based, and smart homes systems is growing rapidly in the current era of technology. User authentication is an important concern for these applications. THJWT i.e., Tuned Hybrid JSON Web Token for JWT-based properties has been particularly evident in the recent growth of client server requests. JWTs (JSON Web Token) are used for authentication of subsequent customer requests without making regular calls to a resource server or database. In this paper, we have introduced the process of authenticating and verifying JWT on each client request based on the random stamp values to verify client authentication on the server data. The effectiveness of the proposed approach is enhanced by case studies that demonstrate time and space complexity.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Security and privacy of user data is a prime concern in today's digital world. User authentication,
access to services and access time in terms of IoT, mobile, web and cloud-based applications [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] are
considered important concerns regarding network security. While communicating with clients, servers
maintain customer identity during customer-server interaction. If vital security checks are not performed
to protect client identity, it can lead to serious misuse of personal data. Real data access becomes
complicated when the same user access a resource server from a different device such as mobile phones,
tabs, personal computers etc. using a different operating system such as such as IOS, Android, Windows,
      </p>
      <sec id="sec-1-1">
        <title>Linux, etc.</title>
        <p>IOT devices such as actuators, gadgets, sensors, radio frequency identification (RFID) tags, and
communication technologies can be integrated together and a variety of physical entities and devices can
be connected to the Internet to permit those objects to communicate with each other.</p>
        <p>From Data Analysis to healthcare and manufacturing, IOT consists mostly of little materials that are
provided with unique identifiers (UIDs) with the ability to send data over a network without requiring
user to user or user to computer interaction. That is why, IOT is the backbone of a grand technological</p>
        <p>2022 Copyright for this paper by its authors.
future. IOT is getting major focus in almost every business sector and, it is a fact that it has already started
having its influence on web app design &amp; development. Further, due to COVID-19 our dependency on
such systems has increased exponentially.</p>
        <p>Although IOT devices have a lot of significance to our busy world but we need to the secure the data
generating from these devices and must have a special check on the security of such devices. The binary
data that is sent over these networks is always important and vulnerable to attack.</p>
        <p>Thus, user data must be secured to protect the privacy and confidentiality of the registered user. If
there is no check, then threats like data tempering, data breaching and theft of personal information can
be there. Hence, some of the crucial terms associated with IOT security involve identification and
authentication. The process of identifying a user as being the claimed/registered person is called user
authentication. The server can provide different roles or privileges to various authorized users. But in
IOT things are little different, there may be a case where a particular node may act as a client for one
node and a server or Authentication Agent for some other, hence a better security system is required.</p>
        <p>A web application (or “web app”) is an application that runs on any web browser and performs various
tasks with the help of Internet. The user-facing component of an IOT system is called the interface of the
application. The app may run on any Operating System such as IOS or Android which can be installed on
a laptop, smartphone or a tablet. Data stored at the sever side is used for access and verification. However,
checking the database server for every request would cause a serious performance bottleneck.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. User Authentication Schemes 2.1</title>
    </sec>
    <sec id="sec-3">
      <title>Traditional Approach</title>
      <p>Old way of providing security is through methods which store a session on each client's machine
(browser) with client authentication on the server. As long as the session is active, the client can send the
request to access the server resources and server responses to the request using the session key. Time keys
are assigned to clients on initial server request after verification of ownership from the database server.
The client keeps the key assigned to the cookie for ongoing communication with the server. The client
sends the same session key to the server for verification for each request. Sever will only look for a valid
session key from the client for client authentication instead of asking for details again. The weakness of
this machine is to easily hijack session keys by attackers. Hackers may use various tools to identify a
malicious power session and gain access to current user sessions. Various extensions, tools and plugins
can be used to transfer cookie and key information to third-party applications.
2.2</p>
    </sec>
    <sec id="sec-4">
      <title>SOAP based OAuth authentication in APIs</title>
      <p>OAuth is a protocol which can grant one application the credentials it requires to access data and
information in another application through a web service. Web services allows SOAP to provide a robust
programming model that helps in the following manner:</p>
      <p>The SOAP (Simple Object Access Protocol) is a messaging protocol specification which is based on
XML to encode requests and responses in case of a web service. It can be used to handle the following
scenarios:
1. Calling a method on a service.
2. To get a response from a service method, and handling its return value and out parameters.
3. Handling errors.</p>
      <p>Limitations of SOAP: SOAP can only work on XML data, this is one of the biggest reasons why a
SOAP API will be less effective, as XML is a verbose and heavy format compared to JavaScript Object
Notations (JSON data). In case of SOAP, API calls made to your server will require more network
resources such as bandwidth and heavy processing which will take more time to authenticate the client. In
SOAP, tight coupling is implemented as the client-server communication depends on WSDL (Web
Service Description Language) contracts. Therefore, SOAP is not recommended for applications which
are loosely coupled. SOAP is harder to code, and can’t be tested in the web browser (as opposed to REST
where we have response codes). Further it is very difficult to make contracts in WSDL, create client stubs
as it follows strict behavior.
2.3</p>
    </sec>
    <sec id="sec-5">
      <title>JWT based authentication in APIs</title>
      <p>The JSON Web Token (JWT) is a secure way of representing a collection of information between two
parties. JWT has been used in various applications to maintain customer authentication while
communicating with the server. Various development tools and frameworks such as Passport, OpenID
Connect, Django REST framework, DNN, Arengu, etc have integrated support for JWT. JWT offers
various methods through which we can authenticate a user and a token can be used to access the server
resources. These methods can be misused by attackers to gain access to server resources.</p>
      <p>In this paper, we present a focused approach for detecting and accessing a server resource with a JWT
predictor attack during client-server interaction and distinguishing between valid and invalid customer
requests after a user's registered credentials are not matching. A case study is conducted in which a new
JWT is developed based on each client request containing either a combination of token with an
authorized unique key which can be a registered username or password. This proposed approach
contributes to eliminating JWT predictors by attackers. JWT defines a secure way to transmit information
between parties as a JSON object. This information can be verified and trusted because it is digitally
signed. Here is how it works:</p>
      <p>A JSON Web Token consists of a header section, payload section, and a signature section in base64url
encoding, separated by dots (periods), given as follows:
HEADER.PAYLOAD. SIGNATURE</p>
      <p>This is how a JWT actually looks like:
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJuYW1lIjoiSm9obiBEb2UiLCJ1c2VX25hbWUiOiJqb2huLm
RvZSIsImlzX2FkbWluIjpmYWxzZX0.fSppjHFaqlNcpK1Q8VudRD84YIuhqFfA67XkLam0_aY
1. The header contains metadata about the token, such as the algorithm used for the signature and
the type of the token (which is simply JWT). For this example, the header before encoding is:
{
}</p>
      <p>"alg": "HS256","typ": "JWT“
2. The payload contains information (claims) about the entity (user) that is going to be verified by
the application. Our sample token includes the following claims:
"is_admin": false
}
3. Finally, to generate the signature, we have to apply base64url encoding and sign the whole thing
using a secret (for symmetric encryption) or a private key (for asymmetric encryption), depending
on the algorithm specified in the header. We can use any algorithm like SHA256 in the header,
which is a symmetric algorithm, so the encoding and signing operation would be:</p>
      <p>HMACSHA256(base64UrlEncode(header) + "." +base64UrlEncode(payload), secret)
This gives us the following signature, which is then appended (after a dot) to the base64url-encoded
headerand payload:</p>
      <p>fSppjHFaqlNcpK1Q8VudRD84YIuhqFfA67XkLam0_aY</p>
      <p>Generally, a server uses same JWT for the all requests until user logs out from system. There is a need
to propose a generalized solution for all type of applications. The generalized solution should secure JWT
to eliminate vulnerability in client authentication. Hence, we are proposing the same as follows:</p>
      <sec id="sec-5-1">
        <title>HMAC using SHA-256</title>
        <p>HMAC using SHA-384
HMAC using SHA-512
RSASSA-PKCS1-v1_5 using SHA-256
RSASSA-PKCS1-v1_5 using SHA-384
RSASSA-PKCS1-v1_5 using SHA-512
ECDSA using P-256 and SHA-256
ECDSA using P-384 and SHA-384
ECDSA using P-521 and SHA-512
RSASSA-PSS using SHA-256 and MGF1 with SHA-256
RSASSA-PSS using SHA-384 and MGF1 with SHA-384
RSASSA-PSS using SHA-512 and MGF1 with SHA-512</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>3. Problem Statement</title>
      <sec id="sec-6-1">
        <title>The two major problem statements are as follows:</title>
        <p>1. Any change in the user role causes a significant value loss after the allocating the token to client.</p>
        <p>It can be hacked to exploit the permissions user was given in the first attempt. A resource on
server should be secure and must not be accessible to the unauthorized users or the users whose
permissions are revoked.
2. Access token or the JWT remains same in most of the cases (get/post/put request and response)
happening between client and server interaction. Attacker can predict this vulnerability and can
temper the JWT.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>4. Proposed Solution</title>
      <p>The following steps can be used to authenticate client on a server through JWT:
•
•
•
•</p>
      <p>The client will send an authentication request by credentials, such as a username– password
combination for login.</p>
      <p>After a valid login, the authentication service will create a JWT with a secret key. This secret key
can be a combination of username or any other registered attribute.</p>
      <p>The client uses this token with the request to a secured resource on server.</p>
      <p>When the server receives the request from client again, it checks the user authentication from
JWT for reorganization of authentic request along with a check on the secret key. Server will send
a proper response based on valid or invalid token.</p>
      <p>The key feature of JWT is that it allows for flexibility in communication, so the client cannot change
the details contained in the token. On the other hand, if the user role is updated it will be displayed or
predictedby the server for any vulnerability in the next application. Under normal circumstances, clients
cannot force you to forget an old JWT token and use a new token.</p>
      <p>With every new THJWT (Tuned Hybrid JSON Web Token) for each resource request with an
authenticatedidentity just to make things harder to predict for the attacker, So, let us assume T is the token
and `T is the combination of Token and unique identity value. When the signature and secret key
combination is calculated it will always generate a unique random-access token (JWT). This token will be
returned to the client in response to each client's request.</p>
      <p>Here are the steps, that will enhance the authenticity of a client on sever:</p>
      <sec id="sec-7-1">
        <title>Step 1: Client makes a request to server with login credentials.</title>
        <p>Step 2: Server receives a request and verifies the credentials from server. If credentials are verified,
then go to step 3 otherwise the control moves to step1.</p>
        <p>Step 3: Server generates JWT by combining a value (it may be any registered user credential).
T=token,T’=token+ (Unique registered credential, can be username)
Step 4: Server will receive a request from client with T’ (Token + Unique registered username).
Step 5: Server will check the token information first if it is not valid, then return Response
Code401(Unauthorized Token) else move to 6.</p>
        <p>Step 6: Server will check the unique registered username if it is not valid-return response
code401(Unauthorized user). If both 5 &amp; 6 are valid it will move to Step-7 else to Step-1.</p>
        <p>Step 7: Server will allocate or provide the resources as per request.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>5. Mechanism</title>
      <p>•</p>
      <p>Server will generate trigger for JWT token with the Help of login credentials (Username and
password) and type of token method.
•</p>
      <p>Request to resources with the help of generated JWT token.</p>
      <p>We add the JWT token to the request with the help of the authentication tool.</p>
      <p>Request to resource with JWT token in the request and it will return 401 (Unauthorized).
Request to resources with the help of JWT token and invalid user name, this will result in
401 (Unauthorized)</p>
      <p>19
•
•</p>
      <p>Request resources with wrong JWT and correct unique this will result in name,
401 (Unauthorized)
Request to resource with correct JWT and correct unique username. This will result in 200
(Ok, Authorized) and you will get the requested resources.</p>
    </sec>
    <sec id="sec-9">
      <title>6. Results and Discussion</title>
      <p>A mobile application is developed to find out the algorithm performance on HTJWT. We have tested
the scenario with 50 times the process, starting from testing the time to generate the token, the size of the
token generated, encrypting it and finally the data transfer speed of the token from the client request to the
server until the token response is received by the client.</p>
      <p>If we compare the performance of all the algorithms used, we can see that the HMACSHA-256
algorithm is superior to an average response time of 8.6ms and size 563bytes when compared to
HMACSHA-384 while with HMACSHA-512.</p>
    </sec>
    <sec id="sec-10">
      <title>7. Conclusion</title>
      <p>In this study, we have presented an enhancement in the JWT access control solutions for different
applications developed on the platforms, such as mobile apps and cloud systems. Creation of new tokens
on every client request on server can resist attacker to identify the signature of a client. We have
implemented a technique which can be used by application developers for securing the server resources
from revoked permissions and unauthenticated requests.</p>
      <p>The results are explained with the comparison of token- based authentication performance using JWT
with several algorithms. The overall results show that the use of THJWT with HMACSHA-256 signature
is superior in case of time taken to generate token, token size and token transfer speed.</p>
    </sec>
    <sec id="sec-11">
      <title>8. Future Work</title>
      <p>We can implement various user roles and authorize them to access specific resources according to the
need of the overall application. Further we can test our system (mobile application) for various types of
cross scripting attacks such as None Algorithm attack, signature stripping, manipulating Kid (Key
Identifier), SQL injection, etc.</p>
    </sec>
    <sec id="sec-12">
      <title>9. References</title>
      <p>[18] Korzun D G, Balandin S I, and Gurtov A V, Deployment of Smart Spaces in Internet of Things:
Overview of the Design Challenges (Lecture Notes in Computer Science), vol.8121. New York, NY,
USA: Springer, 2013.
[19] Chen Y and Luo B, “S2A: Secure smart household appliances,” in Proc. 2nd ACM Conf. Data Appl.</p>
      <p>Secur. Privacy (CODASPY), 2012, pp. 217–228.
[20] Li, “Design Y of a key establishment protocol for smart home energy management system,” in Proc.</p>
      <p>5th Int. Conf. Comput. Intell., Commun. Syst. Netw. (CICSyN), Jun. 2013, pp. 88–93.
[21] Vaidya B, Makrakis D, and Mouftah H T, “Device authentication mechanism for smart energy home
area networks,” in Proc. IEEE Int. Conf. Consum. Electron. (ICCE), Jan. 2011, pp. 7</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Kumar</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gurtov</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iinatti</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ylianttila</surname>
            <given-names>M</given-names>
          </string-name>
          and
          <string-name>
            <surname>Sain</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <article-title>"Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments,"</article-title>
          <source>in IEEE Sensors Journal</source>
          , vol.
          <volume>16</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>254</fpage>
          -
          <lpage>264</lpage>
          , Jan.1,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1109/JSEN.
          <year>2015</year>
          .
          <volume>2475298</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Janardanan</surname>
          </string-name>
          , Ajil Paul C,
          <string-name>
            <surname>Anju</surname>
            <given-names>P</given-names>
          </string-name>
          , Eldiva Thomas V and
          <string-name>
            <surname>Davis</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Android Application for Car Wash Services," 2018 International Conference on Emerging Trends and Innovations In Engineering And Technological Research (ICETIETR)</source>
          ,
          <year>Ernakulam</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICETIETR.
          <year>2018</year>
          .
          <volume>8529025</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Liu</surname>
            <given-names>Z</given-names>
          </string-name>
          and
          <string-name>
            <surname>Gupta B</surname>
          </string-name>
          <article-title>"Study of Secured Full-Stack Web Development,"</article-title>
          <source>Proceedings of 34th International Conference on Computers and Their Applications</source>
          , vol.
          <volume>58</volume>
          , pp.
          <fpage>317</fpage>
          -
          <lpage>324</lpage>
          ,
          <year>2019</year>
          doi: 10.29007/jpj6.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Ethelbert</surname>
            <given-names>O</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moghaddam F.F</surname>
          </string-name>
          ,
          <string-name>
            <surname>Wieder</surname>
            <given-names>P</given-names>
          </string-name>
          and
          <string-name>
            <surname>Yahyapour</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <article-title>"A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications,"</article-title>
          <source>2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud)</source>
          , Prague,
          <year>2017</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>53</lpage>
          . doi:
          <volume>10</volume>
          .1109/FiCloud.
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Hong</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jun</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kang</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <article-title>"A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment," in jornal of sustainability</article-title>
          , vol.
          <volume>9</volume>
          , no.
          <issue>7</issue>
          ,
          <string-name>
            <surname>June</surname>
          </string-name>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Jones</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bradley</surname>
            <given-names>J</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sakimura</surname>
            <given-names>N</given-names>
          </string-name>
          , “
          <article-title>JSON Web Token (JWT) RFC 7519”</article-title>
          , http://www.rfc
          <article-title>-edi tor</article-title>
          .org/rfc/rfc7519.txt,
          <source>RFC Editor</source>
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Chifor</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arseni</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matei</surname>
            <given-names>I</given-names>
          </string-name>
          and
          <string-name>
            <surname>Bica</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <article-title>"Security-Oriented Framework for Internet of Things SmartHome Applications,"</article-title>
          <source>2019 22nd International Conference on Control Systems and Computer Science (CSCS)</source>
          , Bucharest, Romania,
          <year>2019</year>
          , pp.
          <fpage>146</fpage>
          -
          <lpage>153</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSCS.
          <year>2019</year>
          .
          <volume>00033</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Gutzmann</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <article-title>"Access control and session management in the HTTP environment," in IEEE Internet Computing</article-title>
          , vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>26</fpage>
          -
          <lpage>35</lpage>
          ,
          <string-name>
            <surname>Jan</surname>
          </string-name>
          .-Feb.
          <year>2001</year>
          . doi:
          <volume>10</volume>
          .1109/4236.895139.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Yuan</surname>
            <given-names>X</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borkor</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beal</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu. H "</surname>
          </string-name>
          <article-title>Retrieving relevant CAPEC attack patterns for secure software development,"</article-title>
          <source>In Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14)</source>
          , ACM, pp.
          <fpage>33</fpage>
          -
          <lpage>36</lpage>
          ,
          <year>2014</year>
          doi: https://doi.org/10.1145/2602087.2602092.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Viktor Jánoky</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levendovszky</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ekler</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <article-title>"An analysis on the revoking mechanisms for JSON Web Tokens,"</article-title>
          <source>International Journal of Distributed Sensor Networks</source>
          , vol.
          <volume>14</volume>
          ,
          <year>September 2018</year>
          , doi: https://doi.org/10.1177/1550147718801535.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Gomez</surname>
            <given-names>C</given-names>
          </string-name>
          and
          <string-name>
            <surname>Paradells</surname>
            <given-names>J</given-names>
          </string-name>
          , “
          <article-title>Wireless home automation networks: A survey of architectures and technologies</article-title>
          ,” IEEE Commun. Mag., vol.
          <volume>48</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>101</lpage>
          , Jun.
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Kim</surname>
            <given-names>J E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boulos</surname>
            <given-names>G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yackovich</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barth</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beckel</surname>
            <given-names>C</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Mosse</surname>
            <given-names>D</given-names>
          </string-name>
          , “
          <article-title>Seamless integration of heterogeneous devices and access control in smart homes,”</article-title>
          <source>in Proc. 8th Int. Conf. Intell. Environ. (IE)</source>
          ,
          <year>Jun</year>
          .
          <year>2012</year>
          , pp.
          <fpage>206</fpage>
          -
          <lpage>213</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Mantas</surname>
            <given-names>G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lymberopoulos</surname>
            <given-names>D</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Komninos</surname>
            <given-names>N</given-names>
          </string-name>
          , “
          <article-title>Security in smart home environment,” in Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications</article-title>
          . Hershey, PA, USA: IGI Global,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Pishva</surname>
            <given-names>D</given-names>
          </string-name>
          and
          <string-name>
            <surname>Takeda</surname>
            <given-names>K</given-names>
          </string-name>
          , “
          <article-title>A product based security model for smart home appliances,”</article-title>
          <source>in Proc. 40th Annu. IEEE Int. Carnahan Conf. Secur</source>
          . Technol., Oct.
          <year>2006</year>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>242</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Suryadevara</surname>
            <given-names>N K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mukhopadhyay</surname>
            <given-names>S C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>R</given-names>
          </string-name>
          , and Rayudu R K, “
          <article-title>Forecasting the behavior of an elderly using wireless sensors data in a smart home,” Eng</article-title>
          . Appl. Artif. Intell., vol.
          <volume>26</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>2641</fpage>
          -
          <lpage>2652</lpage>
          , Nov.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Bhardwaj</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ozcelebi</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukkien</surname>
            <given-names>J</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Uysal</surname>
            <given-names>C</given-names>
          </string-name>
          , “
          <article-title>Resource and service management architecture of a low capacity network for smart spaces</article-title>
          ,
          <source>” IEEE Trans. Consum</source>
          . Electron.,vol.
          <volume>58</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>389</fpage>
          -
          <lpage>396</lpage>
          , May
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Tschofenig</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arkko</surname>
            <given-names>J</given-names>
          </string-name>
          , and
          <string-name>
            <surname>McPherson</surname>
            <given-names>D</given-names>
          </string-name>
          , “
          <article-title>Architectural considerations in smart object networking</article-title>
          ,” Internet Engineering Task Force, Fremont, CA, USA,
          <source>Tech. Rep. RFC-7452</source>
          , Jul.
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>