Insights of JSON Web Token
Pooja Mahindrakar1, Uma Pujeri2

1Pooja Mahindrakar, School of Computer Engineering and Technology, MIT World Peace University, Pune, Maharashtra, India.
2Dr. Uma Pujeri, School of Computer Engineering and Technology, MIT World Peace University, Pune, Maharashtra, India.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 20, 2020. | Manuscript published on March 30, 2020. | PP: 1707-1710 | Volume-8 Issue-6, March 2020. | Retrieval Number: F7689038620/2020©BEIESP | DOI: 10.35940/ijrte.F7689.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Abstract—In almost every organization where user sensitive data is available, security and privacy of the data plays a vital role. As far as computer science is concerned, it is just a game of saving data in unrecognizable format and accessible to authorized person. User sensitive data mainly includes passwords which are required for the sessions but need to be handled and stored safely. As storage of these information is overhead in database, Tokens are generated which handles sessions and also self contains user details. One of such widely used stateless token is Json Web Token. This paper deals with the introduction, working and algorithms of Json web token. Also pros, cons, hacking possibilities, Proper usage and security measures of JWT are discussed.
Keywords: Token, Authentication, JWT , Security, Privacy, Sessions, Encryption.
Scope of the Article: Security, Privacy and Trust in IoT & IoE.