SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1652
Revisiting Security Aspects of Internet of Things for
Self-Managed Devices
Sapna1, Dr. ShashiKumar D.R2
1Assistant Professor, Department of Information Science and Engineering, Cambridge Institute of Technology,
Karnataka, India
2Professor and Head of the Department, Department of Computer Science and Engineering,
Cambridge Institute of Technology, Karnataka, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Focusing on designing a trusted data exchange
system in an IoT ecosystem using an appropriate architecture
and key management techniques for ensuring the safetyofthe
data is considered. For computers and wearable devices with
restricted computing power and battery capacity, a
lightweight cryptographic algorithm or greater sensor node
efficiency is not yet achieved. Although many cryptosystems
and algorithms are considered secured and robust, they are
not considered for the devices that are resource constrained.
Thus there is a requirement for an efficient algorithm to be
implemented for the resource constraint devices. Inthissurvey
we will consider various security schemes for IoT with respect
to security challenges like confidentiality, integrity,
availability and vulnerabilities and provide solution for them.
Key Words: IoT, key management, security, cryptosystems,
ECC
1. INTRODUCTION
The popular domain of the current technological and digital
world is Internet of Things. The digital era is trending in
current network technologies. Data transferred from one
system to another system, one computer system to other
mobile devices is a common scenario .But the data
communication can also take place between various things,
objects, components like from washing machine to a mobile
device, from a table to a fan, from a garden to a tap and
many more. As the digital data generated on timely basis is
increased in terms of terabytes, petabytes and trillions of
bytes, there is a need for securing the data across the
gateway of networks during communication. Securing the
data involves providingauthenticationmechanismsandthus
proving authorization to a system for communication. This
paper reviews the various approaches for IOT security
considerations and their limitations for further work.
IoT is a worldwide network infrastructure that connects
physical and virtual items using informationcapturebesides
communication capabilities. This structure includes current
Internet and communication network advancements. This
system proposes explicit object-recognition, sensor and
linking ability as per the source intended as the
improvement of autonomous cooperative amenities as well
as applications. These methods will remain branded with a
great grade of independent information capture, incident
transmission, systemconnectivityaswell asinteroperability.
2. RELATED WORK AND MOTIVATION
2.1. IoT Security considerations requirement and
architecture
The architecture offered in this paper[1] is IoT reference
model with Open systems. In this Technique, the model
includes three mechanisms related to security that exists in
each layer independently namely
 Authorization with Validation
 Encoding with Key Supervision
 Confidence with Identity Supervision
Currently in network layer, one may use64-bitalgorithmfor
encryption. On the otherside,a 256-bitencryptionalgorithm
can be used in information aggregation or information
centralization layer. The disadvantage is that each layer-
vendor needs the characteristics to be implemented and
more processing powermay be required. Thisarchitectureis
used in smart applications.
2.2 Securing IoT with Elliptic Curve cryptography
In the proposed[2] IoT protocol for security using Elliptical
Curve Cryptography mechanism, the IoT device can set
secret session key using the normal p-192 Diffie-
Hellman protocol. This protocol is demonstrated using
MIRACL crypto library.
Figure1. highlights the architecture of IoT. All the sensor
nodes are connected to the IoT handheld devices which
also interact with the server and then with a gateway
which in turn communicates with the clouds and
databases.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1653
Figure 1. Architecture of IoT[2]
The major challenge in IoT is sensors. These small
devices are constantly designed and intended for short
power utilization by means of a tiny siliconshapeaspect and
frequently have restricted bandwidth as well as
computational drive owing towards an 8/16 bit
microprocessor. ECIOT protocol that is proposed allows
encryption and decryption of the message for transfer of
message among gateway as well as IOT device based on
elliptical curve.
MIRACL expanded as MultiprecisionIntegerwithRational
Arithmetic Cryptography Library an open source gold
standard SDK is intended for Elliptic Curve Cryptosystems
(ECC) software library frequently regarded by
developers[3][4].The application of an ECIOT procedure
based on this crypto package demonstrates obviously that
Diffie Hellman consumes less funds on the system based on
elliptic curve cryptosystem when related to Diffie Hellman
on the basis of factorial problems.
In this protocol NIST p192 [5] prime field of an elliptic
curve having a specific equation of a curve is
recommended and coined priorly in Weierstrass formula
with finite field for faster computation in IoT [6][7].
Because of the limited computational power of the 8/16-bit
processor, modular reversal operation consumes moretime
for IoT devices. Also in integer-recoding, scalar
multiplication along with addition as well as subtraction
procedure was applied in ECIOT system. This technique
helps in minimizing the hamming burden for integer and
thus IoT devices need to expend lesser amount of
memory and power for computation of session key.
2.3 ECC - enabled intercom communication mechanism
between IPv4 and IPv6
This strategy [8] aims at providing security by the
application of elliptic curve cryptosystem (ECC) so as to
attain integrity, privacy, validation as well as non-
repudiation. Small processing energy and highly
resource-restricted portable and IoT appliances are the
reasons why ECC is used for security. Here a fresh router
scalability is suggested called as 1:N address and security
system.
The model suggested includes couple of heterogeneous
system networks namely IPv4-only and another one
through IPv6-only hosts. Dual-stacked router was used as
a translator. Dual-stacked router programmed based on
the addressing system suggested is used to translate the
IPv4 addresses into IPv6 and vice versa.
The suggested addressing system incorporates IPv4
address in the IPv6 prefix for IPV6 address that is IPv4-
translated as well as IPV6 address that is IPv4-
convertible. The IPv4 translated IPv6 id is a IPv6 id
representing the IPv4 device in the IPv6 system of
network .Also an IPv4-convertible IPv6 id is a IPv6 id
allotted for the IPv6 device aimed at stateless conversion
purposes. Both of these addressing systems apply the same
32-bit network-specific address allocated by the provider of
the service as higher order bits in this proposed addressing
scheme.
Elliptic curve cryptosystem is similar to RSA and El Gamal
public-key crypto system. N.Koblitz[9] and Miller[10]
launched it in the 1990s. ECC safety relies on the issue of
Discrete logarithm of the elliptic curve[11]. It is difficult to
figure out an answer for ECDLP using a bigger primitive key
value within polynomial time[12]. As per all the public-key
Figure 2 System diagram aimed at communication
started by IPv4 [8]
cryptography with fundamental arithmetic operation, ECC
includes multiplication point[13]. In a translator, thus an
elliptic curve cryptosystem provides information integrity,
secrecy, privacy, legitimacy, and more prominently to avoid
deceiving. Although several other cryptosystems are
accessible, the motive for selecting elliptic curve
cryptosystem is because of its capacity being applied in
resource-restricted systems, lower key magnitude, lower
bandwidth ingesting, and quicker execution [14]. Each user
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1654
in ECC requires a public key intended for encryption as well
as a personal decryption / signature key.
Figure 3 System diagram aimed at communication
started by IPv6 [8]
The suggested model[8] is assessed by means of PC
emulator, calculating round tour delay, packet
accessibility, as well as hash generation interval, in
addition to comparing the outcomes. Findings indicate
that the ECC takes much less time than the RSA, resulting
in enhanced safety with relatively less time.
2.4 An effective text encryption method with
Elliptic Curve Cryptosystem
In contrast to any added public key cryptography, ECC
is lightweight, effective and safer. Different techniques to
translate input signal to elliptic curve point are suggested
in this paper. Nevertheless for big input sizes they all lack
safety, scalability and inefficiency in computation. It
therefore requires a scalable as well as computationally
effective procedure.
In this work [15], by arranging the ASCII keys with
respect to input data as abundant as probable, the
number of elliptic curve operations is reduced. Consider,
for instance, the size of the input document is n numeral
of data with characters, then if conversion of individual
character as a point separately, the amount of elliptic
curve operations is O(n) with respect to addition as well
as multiplication. If the values are grouped and then
applied, the process of an elliptic curve, the amount of
addition operation as well as scalar multiplication
operation is decreased and the period for encoding and
decoding is therefore reduced. Grounded by this remark,
two distinct procedures for input data using elliptic curve
data point transformation is proposed to decrease the
price of communication along with the price of
computation.
An issue is formulated as trails: Merge a set of character
type of data(their ASCIIs) with a text message and set a big
amount to
 Reduce the amount with respect to addition
operation as well as operation with scalar
multiplication events
 Minimize encoding and decoding time
 Reduce communication costs and
 Protect the system with respect to multiple attacks
In elliptic curve cryptosystem,aninputtext-data isplotted
to data point on an elliptic curve. Characters one by one or
cluster (group of characters at a time) is shown by cluster to
map input text-data to a point on an elliptic curve. In
character representation, ASCII key-value of a character is
represented as a point in an elliptic curve. But when
groupwise mapping is considered a cluster's ASCII key-
values are joined to represent a big amount by means of
some feature (Totality of positional mass using base b, later
mapped towards a point in an elliptic curve).Using the
division method, a set of ASCII key-values is produced at the
decryption end of the big amount and characters are then
acquired.
This paper [15] recommends two algorithms to map signal
to an elliptic curve point, namely DYNCBASE andDIGTBASE.
Groups are created in both algorithms by mixing a list of
ASCII values to generate big numbers for the input
document. Then use Elliptic curve encoding system at the
completion of the transmitter and decoding at the
completion of the transmitter.Theproceduressuggested are
performing superior than the current procedureand remain
suitable for big input message. The algorithms provide the
similar safety standard as the further encryption based on
ECC. For the input message, the procedures are appropriate
for all language type, i.e. they are scalable.
2.5 A New Effective CP- ABE Curve Cryptography
using Elliptic Curve for IoT
Author suggested a novel approach of pairing-free
information access controller system centredonCiphertext-
procedure attribute-based encoding (CP-ABE) by means of
elliptic curve cryptosystem, abbreviated PFCP-ABE, In this
paper[16 ], they substitute complex bilinear pairing on
elliptic curves with easy scalar multiplication, thus lowering
the general overhead computation. Andtheyhavedeveloped
a fresh manner of important allocation that can withdraw a
user or else an attribute instantaneously without even
updating the keys of additional usersthroughoutthestage of
revoking the attribute. In addition, the system uses the
access structure of the Linear System of Secret Sharing
(LSSS) to improve the expression of the access strategy.
In ABE scheme, the access arrangement specifies that an
suitable user must need the matching characteristics in it.
For instance, a Boolean formulation P ∧ Q ∧(R ∨ S) signifies
that the individual who can decipher the cipher text need to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1655
have qualities pattern P,Q,R or P,Q,S. This could also be
represented in a more understandable way as shown in the
figure 4, similar to an access tree.
They substituted complex bilinear coupling with easy
scalar multiplication with elliptic curves in the suggested
paper[16], resulting in a significantreductioningeneral user
overhead. A fresh way of distributing key is intended to
allow the system to withdraw a user or else an attribute
immediately by not updating the keys of extra users. In
practical implementation, this system implemented
communicative LSSS access formattosatisfydifferentaccess
controller requirements. The assessment demonstrated the
safety of the scheme and its efficiency was demonstrated by
the experiments.
Figure 4. Labelling the access tree to produce an LSSS
matrix
2.6 IoT Wireless device security
By raising the number of devices linked via the Internet
through a network, IoT end users generate an estimation
that customers count reaches billions by 2020, but it
increases safety problems towards a extraordinarylevel and
is therefore one and only one of the main concerns with
respect to IoT safety as well as wireless devices[18 ].The
suggested notion in the corresponding paper [17] is in the
direction of generation of a very secure cryptosystem to
guarantee data security, i.e. the normally encoded
information can be easily violated via the attackers. The
elliptic curve cryptosystem is the novel face of information
security encoding.
At a stage of adding ECC, the concept suggested in the
paper[17] is concerned with enhancing the safety of such
machines and safeguarding data on or across the system.
ECC is evolving as a unique and the greatestsecuritypractice
aimed at network encoding, but any type of disruption
between the transmissions when applying ECC canbea very
tough task to accomplish.
ECC's encoding technique is greatly aswell asstrongerfor
breaking through and totaling thisforthe entireIoTnetwork
will adopt the standard level of IoT safety across all the
systems and also for wireless devices as they will be the
network’s most susceptible targets and aremostsusceptible
to threats. Under system of IoT safety, ECC will be applied to
each layer or node at which the information is transmitted,
generating a fresh random signal under these wireless
systems at point which will guarantee their safety at a high
place.
Key Size of ECC Security Equivalent of RSA
224 bit 2048 bit
256 bit 3072 bit
384 bit 7680 bit
521 bit 15360 bit
Table 1 : Evaluation of Key size [17]
The key size comparison shown above demonstrates how th
e ECC is better than the current techniques.
2.7 Cryptanalytics of a Protected Authentication
System for IoT as well as cloud service provider using
Elliptic Curve Cryptosystem
Kumariet. al. scheme [19] includes three stages as follows:
 Initialization stage - In this stage selection of secret
key is done randomly.
 Registration stage -The registration stage has
twofold steps. First step includes computation of
separate identity say I by the embedded device and
using this identity along with password it is sent to
cloud service provider S. Once the cloud service
provider S receives, it creates a dissimilar identity
for embedded equipmentandprotectseveryrelated
facts with respect to this identity.
 Login and validation stage
The author [19] stated their structure is secure from
various assaults and offers for all safety requirements. But
as per the review, we demonstrate that the job remains
insecure in contradiction with various assaults like stolen-
secret key attack verifier, stolen-identityattack verifier,non-
session key security, lots of login attack as well as insider
attack.
2.8 Validated Scyther Session Key IoT Establishment
In this paper[20]a termspecificcontractsystemgrounded
on elliptical curve cryptography is proposed.AlsoinScyther,
the system was simulated to validate it against different
assaults. This paper uses Sycther [21] tomodel andofficially
verify the ECDH protocol. A protocol was suggested to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1656
establish a session key among nodes in an IoT system. The
planned protocol requires validation counter to active as
well as passive attacks withthehelpofscythe.Establishment
of Session Key remains as basic service to attain
confidentiality, verification plus integrity. Term key is
developed using symmetric or unequal methods. Term key
methods using symmetric methods have constraints that
comprise node seizure, scalability, as well as the
establishment of a protected source of communication [22].
Approaches created using asymmetric cryptosystems are
useful and strong in establishing a session key between two
sides. There arestringentcomputational instrumentsusedin
IoT networks. It is not really possible to use traditional
asymmetric techniques because they include high overhead
cost in terms of computation. Elliptical curve cryptosystem
had made lot of promise with respect to enablingofeffectual
cryptographic facilities in the system of networks including
low energy devices .1024 bits of RSA delivers a similar
security power like 160 bit of ECC. Based on ECC, Diffie
Hellman is a light weight as well as an important method to
set up an IoT session key. Since no authentication is
provided in ECDH, it is susceptible to Man-in-the-Middle
Attack(MIMA).[23][24][25] This paper uses Sycther to
model and formally verify the ECDH protocol[26].Aprotocol
for setting active term key among networking nodes in an
IoT system has been suggested. The suggested protocol was
authorized using Scyther in contrary to active as well as
passive assaults.
Elliptical Curve Cryptography is an asymmetric method
found through Victor Miller and Neil Koblitz in 1985. ECC's
essence is to createquickerandmore effectivecryptographic
processes by smaller keys. ECC power is grounded on
elliptical curve computational hardness ecdlp's discrete
logarithm problem[27][28][29].
Equation for elliptic curve is denoted as : m2 = n3 + bn + c,
wherein m, n, b and c will be chosen within prime fields or
else from real numbers. An ECC arc using b= - 4 and c= -0.67
is represented in Figure5 [30].
Figure 5: ECC arc using b= -4 c=-0.67 for the equation: m2
= n3 – 4n + 0.67
The significance of the IoT session key was
highlighted[20]. It addressed a factual session key creation
protocol for IoT, ECDH and highlighted its constraints. In
Scyther, ECDH stayed demonstrated and evaluated contrary
to different intimidations. Elliptic Curve Diffie–Hellman's
Scyther assessment showed that it was susceptible to MIMA
Attack.
MIMA Attack is not prone to the suggested protocol as rep
resented in the Sycther analysis.
2.9 Lightweight ECC schema for IoT security with
delicate Zero Watermarking
ECC [31] is an approach that offers security as well as
privacy for a resource-specific IoT situation with great
computational competence and also reduced energy intake.
Yet, using EC Digital Signature (ECDSA) intended for IoT
consumers involves composite actions in the creation and
validation of signatures by great memory utilization. The
author thus suggests a lightweight ECC Watermark schema
which overcomes that limitation of ECC-based processes
through a fragile zero watermarking method for
authentication than digital signature. Evaluation of the
current approach with related further present ECC
technologies that includes ECC standard, EC-Schnorr and
ECC Montgomery is done.
It is vital to ensure the integrity, confidentialityalongwith
privacy of delicate information and people through the IoT
ecosystem system. But adjusting security with
confidentiality in resource-hungry, small-power as well as
dissimilar networks through high productivity is an
interesting task. ECC[32] is capable of meeting these
requirements. As ECC needs low power, less computation,
low memory but provide robust safety and secrecy in a
resource-restricted IoT system, it is referredasanoptionfor
IoT network security. ECC stands as a public-key
cryptography as well as public-key infrastructure centered
on the complexity in calculating discrete logarithms on the
set of points recognized in the elliptic curve on a finite
field[32]. This also compromises the safety of standard
public-key-based cryptosystem at the same level with
significantly reduced sizes [33]. Various schemes are:
i) Typical ECC scheme
Elliptic Curve IntegratedEncodingScheme(ECIES)isused
by the standard ECC system. For message transfer among
source and destination node, mutual nodes must decide on
the similar Elliptic Curve E on a binary field as a n2+mn=
m3+bm2+c equation, where b, c ∈{0,1}.Let C and D be two
points on E as C=(x1,y1) and D=(x2,y2) with C≠D. Thus it is
possible to calculate point point O = C+D = (x3,y3). This
system includes the following steps with these coordinate
points:
 Key Generation and Exchange Phase
 Encryption phase
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1657
 Transmission phase
 Decryption phase
ii) EC- Schnorr Scheme
The distinction between EC-Schnorr and standard ECC is
with respect to the process of signature creation.
Compared to standard ECC scheme,theamountofmodular
processes is condensedtominimizethecomputational cost
of signature generation.
iii) ECC-Montgomery Scheme
As a conventional ECC schema ECC-Montgomery too
resembles all its measures. Only the distinction, as stated in
[34 ], is in the signature generations stepsandthe procedure
from [ 34 ] is applied to implement Montgomery ECDSA.
iv) ECC Watermark Scheme
The ECC Watermark system proposed [31] is centred on
fragile watermarking zero. A fragile zero-watermark is
produced since the areas of the information packet header
instead of adding continuous alteration by inserting
additional parts into the packet payload. This system of
watermark essentially gives the receiving device the
legitimacy of the sender device by inspecting the watermark
of the sender. Furthermore, application of ECC for encoded
packets offers powerful safety aswell asinformationsecrecy
by creating multiplication of curve points and adding
complicated and harder to decrypt attackers. The ECC
Watermark Scheme stages are as follows:
• Key Generation and Exchange Phase
• Encryption Phase
• Transmission Phase
• Decryption Phase
Analysing and comparing the system results of various
schemes in this work is done: ECCWatermark,standardECC,
EC-Schnorr and ECC-Montgomery schemes in terms of
memory and calculation costs. The proposed [31] ECC
Watermark system, the creation and verification of
watermarks need considerably less period and memory to
process. This is primarily since the multiplication points of
elliptic curve is needless for the creation of watermarks as
well as the authenticity of a sender device is checked at a
receiver node by inspecting the header source IP and
protocol of the watermark data packet. With an enhanced
packet information volume, after encoding information at a
source device, it is noted thattheECCWatermark system has
greater performance effectiveness with respect to
computational price at a destination device and price of
memory.
3. CONCLUSIONS
The continuing state of the IoT shows that important
research remains to be done to secure embedded computer
equipment. Despite the increase in the count of IoT devices
as well as fresh techniques and science journals over the
previous few years, safety solutionsandimprovementshave
not held pace. Publicly known breaches of safety initiation
vectors point to vulnerable and/or overlooked IoT devices
and the amount of stolen documents continues to increase.
The quantity of information handled by IoT devices rises at
exponential rates, which impliesgreater exposureofdelicate
information and raises the need for discussion amongsafety
scientists to be encouraged.
Recent attempts have failed to cover the entire safety
spectrum, revealing opportunities for studies in various
fields, including intelligent object hardening and detection
capacities. Current issues and difficulties should be taken as
possibilities for enhancement that must be accomplished
through a strict method that includes early design safety
goals and the competent and effective implementation of
standardized safety solutionsinmanufacturingphases.Final
consumers also need to comprehend the device's primary
goal and how to meet their demands under rigorous control
and scrutiny in order to handle the interconnectivity danger
that is always present.
REFERENCES
[1] Daniel Minoli ,Kazem Sohraby et al, IoT security
(IoTSec) considerations, requirements, and
architectures, 14th IEEE Annual Consumer
Communications & Networking Conference (CCNC) Las
Vegas, NV, USA, 2017.
[2] Darshana Pritam Shah, Pritam Gajkumar Shah, Revisting
of Elliptical Curve Cryptography forSecuringInternetof
Things (IOT), 2018 Advances in Science and
Engineering Technology International Conferences
(ASET), Abu Dhabi, United Arab Emirates 2018.
[3] https://github.com/miracl/MIRACL
[4] D. Hankerson, A. Menezes, and S. Vanstone, Guide to
Elliptic Curve Cryptography. New York: Springer, 2004.
[5] ] https://eprint.iacr.org/2013/734.pdf
[6] N. Koblitz, "Elliptic curve cryptosystems,"inMathematics
of Computation vol. 48, ed: American Mathematical
Society, 1987.
[7] V. Miller, Uses of elliptic curves in cryptography vol. 218:
Springer, Heidelberg, 1986
[8] D. Akilandeswari, S. Albert Rabara and T. Daisy Premila
Bai, ECC-Enabled Translation Mechanism for
Intercommunication Between IPv4 and IPv6, 2018
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1658
International Conference on Communication andSignal
Processing (ICCSP)
[9] Koblitz, N., “Elliptic curve cryptosystems”. Mathematics
of Computation, Vol.49, pp. 203-209, 1987
[10] V.Miller, “Uses of elliptic curves in cryptography,”
Crypto 1985, LCNS 218: Advances in Cryptology,
Springer-Verlag, 1986.
[11] Moncef, A., Amar, S. “Elliptic curve cryptography and its
applications”,ProceedingsIEEEInternational Workshop
on Systems, Signal Processing and their Applications
(WOSSPA), 9th-11th May, Algeria, pp. 247-250, 2011.
[12] C. Paar and J. Pelzl, Understanding cryptography, a
textbook for students and practitioners. Springer
Science & business Media, 2009
[13] Nejmeddine ALIMI, Younes LAHBIB, Mohsen
MACHHOUT & Rached TOURKI, “On elliptic curve
cryptography implementations and evaluation,”IEEEin
proceedings of 2nd International Conference on
Advanced TechnologiesforSignal andImageProcessing,
ATSIP’2016, pp. 35-40, 2016.
[14] Xiang Wang, Liping Wang, Yuanchen Bai, Zhenxue He,
Tao Wang, bin Xu, He Zhang, Xiaocui Wang,
“Optimization of elliptic curve cryptography resisting
power attack scalar multiplication algorithminsecurity
system on chip,” IEEE UIC-ATC-ScalCom-CBDCom-IoP,
pp. 1397-1401, 2015.
[15] Prasenjit Das, Chandan Giri, AnEfficientMethodfortext
Encryption using Elliptic Curve Cryptography, 2018
IEEE 8th International Advance Computing Conference
(IACC), Greater Noida, India.
[16] Sheng Ding, Chen Li, Hui Li, A Novel Efficient Pairing-
free CP-ABE Based on Elliptic Curve Cryptography for
IoT, IEEE Access ,2018
[17] Rishav Gauniyal, Dr. Sarika Jain, IoT Securityin Wireless
Devices, Proceedings of the Third International
Conference on Electronics Communication and
Aerospace Technology [ICECA 2019] IEEE Conference
Record # 45616; IEEE Xplore ISBN:978-1-7281-0167-5
[18] Shams Shapsough, Fadi Aloul, Imran A Zualkernan
(2018), “Securing Low-Resource Edge Devices for IoT
Systems”, 2018 International SymposiuminSensingand
Instrumentation in IoT Era (ISSI),Pages:1-4,Year:2018
[19] Adesh Kumari ; Vinod Kumar ; M.YahyaAbbasietal,The
Cryptanalysis of a Secure Authentication Scheme Based
on Elliptic Curve Cryptography for IOT and Cloud
Servers, 2018 International Conference on Advancesin
Computing, Communication Control and Networking
(ICACCCN), Greater Noida (UP), India.
[20] Ashaq Maqbool, Mohsin UI Islam et al, ScytherValidated
Session Key Establishment in IoT, 2019 5th
International Conference on Advanced Computing &
Communication Systems (ICACCS), Coimbatore, India
[21] Operational Semantics and Verification of Security
Protocols[M], Berlin Heidelberg: Springer -Verlag, pp.
78-103, 2012.
[22] Xiao, Y., Ravi, V. K. and Sun, B., 2007 “ A Survey of Key
Management Schemes in Wireless Sensor Networks, ”
Elsevier Journal of Computer Communications., Vol 30,
pp 2314-2341
[23] Energy Efficient Implementation ofECDHKeyExchange
for Wireless Sensor Networks: Crtien etal at IFIP
International Federation for Information Processing
2009
[24] Huang, X. Shah, P. G and Sharma, D. 2010 “Protecting
from attacking the man-in-middle in wireless sensor
networks with elliptic curve cryptography key
exchange, ” 4th IEEE International Conference on
Network and System Security, pp. 588–593
[25] Gura, N., Patel, A., et. al 2004 ” Comparing Elliptic Curve
Cryptography and RSA on 8 bit CPU, ” Workshop on
cryptographic hardware and embedded systems
[26] Operational Semantics and Verification of Security
Protocols[M], Berlin Heidelberg: Springer -Verlag, pp.
78-103, 2012.
[27] Menzes, B., “Network Security and Cryptography”,
Cengage Learning
[28] Hankerson, D. et al. “Guide to Elliptic Curve
Cryptography” Springer.
[29] Gura, N., Patel, A., Wander, A. S, Eberle, H. and Chang
Shantz, S., 2004 “Comparing ellipticcurvecryptography
and RSA on 8-bit CPUs”. Cryptographic Hardware and
Embedded Systems, vol. 3156, pp. 119– 132. Springer
[30] www.certicom.com accessed on 14-02-2019
[31] Kinza Sarwar, Sira Yongchareon et al, Lightweight ECC
with Fragile Zero Water marking for Internet of
ThingsSecurity, 2018 17th IEEE International
Conference OnTrust,SecurityAndPrivacyInComputing
And Communications/ 12th IEEE International
Conference On Big Data Science And Engineering.
[32] Amara, M. and A. Siad. Elliptic Curve Cryptography and
its applications. in Systems, Signal Processing and their
Applications (WOSSPA), 2011 7th International
Workshop on. 2011. IEEE.
[33] Chatzigiannakis, I., A. Vitaletti, and A. Pyrgelis, A
privacypreserving smart parking system using an IoT
elliptic curve based
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1659
[34] Hossain, M.S. and G. Muhammad, Cloud-assisted
industrial internet of things (iiot)–enabled framework
for health monitoring. Computer Networks, 2016. 101:
p. 192-202.
BIOGRAPHIES
Mrs. Sapna obtained her B.E
degree in Computer Science and
Engineering from Visvesvaraya
Technological University (VTU).
She was awarded Master’s degree
in Computer Networks and
Engineering from Visvesvaraya
Technological University (VTU).
She is pursuing Ph.D degree from
Visvesvaraya Technological
University (VTU). Currently, she is
an Assistant professor in the
Department of Information Science
and Engineering, Cambridge
Institute of Technology,
Visvesvaraya Technological
University (VTU). Her
specializations include Computer
Networks and security, Machine
Learning. Her current research
interests are Security in Internet of
Things.
Dr.Dandinashivara Revanna
Shashikumar received BE degree
from Mysore University and ME
degree from Bangalore University,
Bangalore and Ph.D in
Information and Communication
Technology at Fakir Mohan
University, Balasore, Orissa. He is
currentlyworkingasProfessorand
HoD, Dept. of Computer Science,
Cambridge InstituteofTechnology,
Visvesvaraya Technological
University (VTU). His research
interests include Microprocessors,
Pattern Recognition, and
Biometrics, Computer Networks,
Data mining and Data Warehouse
He has published 20 research
publications in referred National
and International Journals. He is
the reviewer for some of the
International journals.

Contenu connexe

Tendances

Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloeSAT Journals
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocolsClint Smith
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
Mobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksMobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksDr. Fahad Aijaz
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Conference Papers
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 

Tendances (20)

Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Unit 4
Unit 4Unit 4
Unit 4
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
A novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccoloA novel architecture for lightweight block cipher, piccolo
A novel architecture for lightweight block cipher, piccolo
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocols
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
Mobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksMobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor Networks
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 

Similaire à IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed Devices

Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...IRJET Journal
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET Journal
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networksijtsrd
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 

Similaire à IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed Devices (20)

Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of Things
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Dernier (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed Devices

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1652 Revisiting Security Aspects of Internet of Things for Self-Managed Devices Sapna1, Dr. ShashiKumar D.R2 1Assistant Professor, Department of Information Science and Engineering, Cambridge Institute of Technology, Karnataka, India 2Professor and Head of the Department, Department of Computer Science and Engineering, Cambridge Institute of Technology, Karnataka, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Focusing on designing a trusted data exchange system in an IoT ecosystem using an appropriate architecture and key management techniques for ensuring the safetyofthe data is considered. For computers and wearable devices with restricted computing power and battery capacity, a lightweight cryptographic algorithm or greater sensor node efficiency is not yet achieved. Although many cryptosystems and algorithms are considered secured and robust, they are not considered for the devices that are resource constrained. Thus there is a requirement for an efficient algorithm to be implemented for the resource constraint devices. Inthissurvey we will consider various security schemes for IoT with respect to security challenges like confidentiality, integrity, availability and vulnerabilities and provide solution for them. Key Words: IoT, key management, security, cryptosystems, ECC 1. INTRODUCTION The popular domain of the current technological and digital world is Internet of Things. The digital era is trending in current network technologies. Data transferred from one system to another system, one computer system to other mobile devices is a common scenario .But the data communication can also take place between various things, objects, components like from washing machine to a mobile device, from a table to a fan, from a garden to a tap and many more. As the digital data generated on timely basis is increased in terms of terabytes, petabytes and trillions of bytes, there is a need for securing the data across the gateway of networks during communication. Securing the data involves providingauthenticationmechanismsandthus proving authorization to a system for communication. This paper reviews the various approaches for IOT security considerations and their limitations for further work. IoT is a worldwide network infrastructure that connects physical and virtual items using informationcapturebesides communication capabilities. This structure includes current Internet and communication network advancements. This system proposes explicit object-recognition, sensor and linking ability as per the source intended as the improvement of autonomous cooperative amenities as well as applications. These methods will remain branded with a great grade of independent information capture, incident transmission, systemconnectivityaswell asinteroperability. 2. RELATED WORK AND MOTIVATION 2.1. IoT Security considerations requirement and architecture The architecture offered in this paper[1] is IoT reference model with Open systems. In this Technique, the model includes three mechanisms related to security that exists in each layer independently namely  Authorization with Validation  Encoding with Key Supervision  Confidence with Identity Supervision Currently in network layer, one may use64-bitalgorithmfor encryption. On the otherside,a 256-bitencryptionalgorithm can be used in information aggregation or information centralization layer. The disadvantage is that each layer- vendor needs the characteristics to be implemented and more processing powermay be required. Thisarchitectureis used in smart applications. 2.2 Securing IoT with Elliptic Curve cryptography In the proposed[2] IoT protocol for security using Elliptical Curve Cryptography mechanism, the IoT device can set secret session key using the normal p-192 Diffie- Hellman protocol. This protocol is demonstrated using MIRACL crypto library. Figure1. highlights the architecture of IoT. All the sensor nodes are connected to the IoT handheld devices which also interact with the server and then with a gateway which in turn communicates with the clouds and databases.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1653 Figure 1. Architecture of IoT[2] The major challenge in IoT is sensors. These small devices are constantly designed and intended for short power utilization by means of a tiny siliconshapeaspect and frequently have restricted bandwidth as well as computational drive owing towards an 8/16 bit microprocessor. ECIOT protocol that is proposed allows encryption and decryption of the message for transfer of message among gateway as well as IOT device based on elliptical curve. MIRACL expanded as MultiprecisionIntegerwithRational Arithmetic Cryptography Library an open source gold standard SDK is intended for Elliptic Curve Cryptosystems (ECC) software library frequently regarded by developers[3][4].The application of an ECIOT procedure based on this crypto package demonstrates obviously that Diffie Hellman consumes less funds on the system based on elliptic curve cryptosystem when related to Diffie Hellman on the basis of factorial problems. In this protocol NIST p192 [5] prime field of an elliptic curve having a specific equation of a curve is recommended and coined priorly in Weierstrass formula with finite field for faster computation in IoT [6][7]. Because of the limited computational power of the 8/16-bit processor, modular reversal operation consumes moretime for IoT devices. Also in integer-recoding, scalar multiplication along with addition as well as subtraction procedure was applied in ECIOT system. This technique helps in minimizing the hamming burden for integer and thus IoT devices need to expend lesser amount of memory and power for computation of session key. 2.3 ECC - enabled intercom communication mechanism between IPv4 and IPv6 This strategy [8] aims at providing security by the application of elliptic curve cryptosystem (ECC) so as to attain integrity, privacy, validation as well as non- repudiation. Small processing energy and highly resource-restricted portable and IoT appliances are the reasons why ECC is used for security. Here a fresh router scalability is suggested called as 1:N address and security system. The model suggested includes couple of heterogeneous system networks namely IPv4-only and another one through IPv6-only hosts. Dual-stacked router was used as a translator. Dual-stacked router programmed based on the addressing system suggested is used to translate the IPv4 addresses into IPv6 and vice versa. The suggested addressing system incorporates IPv4 address in the IPv6 prefix for IPV6 address that is IPv4- translated as well as IPV6 address that is IPv4- convertible. The IPv4 translated IPv6 id is a IPv6 id representing the IPv4 device in the IPv6 system of network .Also an IPv4-convertible IPv6 id is a IPv6 id allotted for the IPv6 device aimed at stateless conversion purposes. Both of these addressing systems apply the same 32-bit network-specific address allocated by the provider of the service as higher order bits in this proposed addressing scheme. Elliptic curve cryptosystem is similar to RSA and El Gamal public-key crypto system. N.Koblitz[9] and Miller[10] launched it in the 1990s. ECC safety relies on the issue of Discrete logarithm of the elliptic curve[11]. It is difficult to figure out an answer for ECDLP using a bigger primitive key value within polynomial time[12]. As per all the public-key Figure 2 System diagram aimed at communication started by IPv4 [8] cryptography with fundamental arithmetic operation, ECC includes multiplication point[13]. In a translator, thus an elliptic curve cryptosystem provides information integrity, secrecy, privacy, legitimacy, and more prominently to avoid deceiving. Although several other cryptosystems are accessible, the motive for selecting elliptic curve cryptosystem is because of its capacity being applied in resource-restricted systems, lower key magnitude, lower bandwidth ingesting, and quicker execution [14]. Each user
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1654 in ECC requires a public key intended for encryption as well as a personal decryption / signature key. Figure 3 System diagram aimed at communication started by IPv6 [8] The suggested model[8] is assessed by means of PC emulator, calculating round tour delay, packet accessibility, as well as hash generation interval, in addition to comparing the outcomes. Findings indicate that the ECC takes much less time than the RSA, resulting in enhanced safety with relatively less time. 2.4 An effective text encryption method with Elliptic Curve Cryptosystem In contrast to any added public key cryptography, ECC is lightweight, effective and safer. Different techniques to translate input signal to elliptic curve point are suggested in this paper. Nevertheless for big input sizes they all lack safety, scalability and inefficiency in computation. It therefore requires a scalable as well as computationally effective procedure. In this work [15], by arranging the ASCII keys with respect to input data as abundant as probable, the number of elliptic curve operations is reduced. Consider, for instance, the size of the input document is n numeral of data with characters, then if conversion of individual character as a point separately, the amount of elliptic curve operations is O(n) with respect to addition as well as multiplication. If the values are grouped and then applied, the process of an elliptic curve, the amount of addition operation as well as scalar multiplication operation is decreased and the period for encoding and decoding is therefore reduced. Grounded by this remark, two distinct procedures for input data using elliptic curve data point transformation is proposed to decrease the price of communication along with the price of computation. An issue is formulated as trails: Merge a set of character type of data(their ASCIIs) with a text message and set a big amount to  Reduce the amount with respect to addition operation as well as operation with scalar multiplication events  Minimize encoding and decoding time  Reduce communication costs and  Protect the system with respect to multiple attacks In elliptic curve cryptosystem,aninputtext-data isplotted to data point on an elliptic curve. Characters one by one or cluster (group of characters at a time) is shown by cluster to map input text-data to a point on an elliptic curve. In character representation, ASCII key-value of a character is represented as a point in an elliptic curve. But when groupwise mapping is considered a cluster's ASCII key- values are joined to represent a big amount by means of some feature (Totality of positional mass using base b, later mapped towards a point in an elliptic curve).Using the division method, a set of ASCII key-values is produced at the decryption end of the big amount and characters are then acquired. This paper [15] recommends two algorithms to map signal to an elliptic curve point, namely DYNCBASE andDIGTBASE. Groups are created in both algorithms by mixing a list of ASCII values to generate big numbers for the input document. Then use Elliptic curve encoding system at the completion of the transmitter and decoding at the completion of the transmitter.Theproceduressuggested are performing superior than the current procedureand remain suitable for big input message. The algorithms provide the similar safety standard as the further encryption based on ECC. For the input message, the procedures are appropriate for all language type, i.e. they are scalable. 2.5 A New Effective CP- ABE Curve Cryptography using Elliptic Curve for IoT Author suggested a novel approach of pairing-free information access controller system centredonCiphertext- procedure attribute-based encoding (CP-ABE) by means of elliptic curve cryptosystem, abbreviated PFCP-ABE, In this paper[16 ], they substitute complex bilinear pairing on elliptic curves with easy scalar multiplication, thus lowering the general overhead computation. Andtheyhavedeveloped a fresh manner of important allocation that can withdraw a user or else an attribute instantaneously without even updating the keys of additional usersthroughoutthestage of revoking the attribute. In addition, the system uses the access structure of the Linear System of Secret Sharing (LSSS) to improve the expression of the access strategy. In ABE scheme, the access arrangement specifies that an suitable user must need the matching characteristics in it. For instance, a Boolean formulation P ∧ Q ∧(R ∨ S) signifies that the individual who can decipher the cipher text need to
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1655 have qualities pattern P,Q,R or P,Q,S. This could also be represented in a more understandable way as shown in the figure 4, similar to an access tree. They substituted complex bilinear coupling with easy scalar multiplication with elliptic curves in the suggested paper[16], resulting in a significantreductioningeneral user overhead. A fresh way of distributing key is intended to allow the system to withdraw a user or else an attribute immediately by not updating the keys of extra users. In practical implementation, this system implemented communicative LSSS access formattosatisfydifferentaccess controller requirements. The assessment demonstrated the safety of the scheme and its efficiency was demonstrated by the experiments. Figure 4. Labelling the access tree to produce an LSSS matrix 2.6 IoT Wireless device security By raising the number of devices linked via the Internet through a network, IoT end users generate an estimation that customers count reaches billions by 2020, but it increases safety problems towards a extraordinarylevel and is therefore one and only one of the main concerns with respect to IoT safety as well as wireless devices[18 ].The suggested notion in the corresponding paper [17] is in the direction of generation of a very secure cryptosystem to guarantee data security, i.e. the normally encoded information can be easily violated via the attackers. The elliptic curve cryptosystem is the novel face of information security encoding. At a stage of adding ECC, the concept suggested in the paper[17] is concerned with enhancing the safety of such machines and safeguarding data on or across the system. ECC is evolving as a unique and the greatestsecuritypractice aimed at network encoding, but any type of disruption between the transmissions when applying ECC canbea very tough task to accomplish. ECC's encoding technique is greatly aswell asstrongerfor breaking through and totaling thisforthe entireIoTnetwork will adopt the standard level of IoT safety across all the systems and also for wireless devices as they will be the network’s most susceptible targets and aremostsusceptible to threats. Under system of IoT safety, ECC will be applied to each layer or node at which the information is transmitted, generating a fresh random signal under these wireless systems at point which will guarantee their safety at a high place. Key Size of ECC Security Equivalent of RSA 224 bit 2048 bit 256 bit 3072 bit 384 bit 7680 bit 521 bit 15360 bit Table 1 : Evaluation of Key size [17] The key size comparison shown above demonstrates how th e ECC is better than the current techniques. 2.7 Cryptanalytics of a Protected Authentication System for IoT as well as cloud service provider using Elliptic Curve Cryptosystem Kumariet. al. scheme [19] includes three stages as follows:  Initialization stage - In this stage selection of secret key is done randomly.  Registration stage -The registration stage has twofold steps. First step includes computation of separate identity say I by the embedded device and using this identity along with password it is sent to cloud service provider S. Once the cloud service provider S receives, it creates a dissimilar identity for embedded equipmentandprotectseveryrelated facts with respect to this identity.  Login and validation stage The author [19] stated their structure is secure from various assaults and offers for all safety requirements. But as per the review, we demonstrate that the job remains insecure in contradiction with various assaults like stolen- secret key attack verifier, stolen-identityattack verifier,non- session key security, lots of login attack as well as insider attack. 2.8 Validated Scyther Session Key IoT Establishment In this paper[20]a termspecificcontractsystemgrounded on elliptical curve cryptography is proposed.AlsoinScyther, the system was simulated to validate it against different assaults. This paper uses Sycther [21] tomodel andofficially verify the ECDH protocol. A protocol was suggested to
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1656 establish a session key among nodes in an IoT system. The planned protocol requires validation counter to active as well as passive attacks withthehelpofscythe.Establishment of Session Key remains as basic service to attain confidentiality, verification plus integrity. Term key is developed using symmetric or unequal methods. Term key methods using symmetric methods have constraints that comprise node seizure, scalability, as well as the establishment of a protected source of communication [22]. Approaches created using asymmetric cryptosystems are useful and strong in establishing a session key between two sides. There arestringentcomputational instrumentsusedin IoT networks. It is not really possible to use traditional asymmetric techniques because they include high overhead cost in terms of computation. Elliptical curve cryptosystem had made lot of promise with respect to enablingofeffectual cryptographic facilities in the system of networks including low energy devices .1024 bits of RSA delivers a similar security power like 160 bit of ECC. Based on ECC, Diffie Hellman is a light weight as well as an important method to set up an IoT session key. Since no authentication is provided in ECDH, it is susceptible to Man-in-the-Middle Attack(MIMA).[23][24][25] This paper uses Sycther to model and formally verify the ECDH protocol[26].Aprotocol for setting active term key among networking nodes in an IoT system has been suggested. The suggested protocol was authorized using Scyther in contrary to active as well as passive assaults. Elliptical Curve Cryptography is an asymmetric method found through Victor Miller and Neil Koblitz in 1985. ECC's essence is to createquickerandmore effectivecryptographic processes by smaller keys. ECC power is grounded on elliptical curve computational hardness ecdlp's discrete logarithm problem[27][28][29]. Equation for elliptic curve is denoted as : m2 = n3 + bn + c, wherein m, n, b and c will be chosen within prime fields or else from real numbers. An ECC arc using b= - 4 and c= -0.67 is represented in Figure5 [30]. Figure 5: ECC arc using b= -4 c=-0.67 for the equation: m2 = n3 – 4n + 0.67 The significance of the IoT session key was highlighted[20]. It addressed a factual session key creation protocol for IoT, ECDH and highlighted its constraints. In Scyther, ECDH stayed demonstrated and evaluated contrary to different intimidations. Elliptic Curve Diffie–Hellman's Scyther assessment showed that it was susceptible to MIMA Attack. MIMA Attack is not prone to the suggested protocol as rep resented in the Sycther analysis. 2.9 Lightweight ECC schema for IoT security with delicate Zero Watermarking ECC [31] is an approach that offers security as well as privacy for a resource-specific IoT situation with great computational competence and also reduced energy intake. Yet, using EC Digital Signature (ECDSA) intended for IoT consumers involves composite actions in the creation and validation of signatures by great memory utilization. The author thus suggests a lightweight ECC Watermark schema which overcomes that limitation of ECC-based processes through a fragile zero watermarking method for authentication than digital signature. Evaluation of the current approach with related further present ECC technologies that includes ECC standard, EC-Schnorr and ECC Montgomery is done. It is vital to ensure the integrity, confidentialityalongwith privacy of delicate information and people through the IoT ecosystem system. But adjusting security with confidentiality in resource-hungry, small-power as well as dissimilar networks through high productivity is an interesting task. ECC[32] is capable of meeting these requirements. As ECC needs low power, less computation, low memory but provide robust safety and secrecy in a resource-restricted IoT system, it is referredasanoptionfor IoT network security. ECC stands as a public-key cryptography as well as public-key infrastructure centered on the complexity in calculating discrete logarithms on the set of points recognized in the elliptic curve on a finite field[32]. This also compromises the safety of standard public-key-based cryptosystem at the same level with significantly reduced sizes [33]. Various schemes are: i) Typical ECC scheme Elliptic Curve IntegratedEncodingScheme(ECIES)isused by the standard ECC system. For message transfer among source and destination node, mutual nodes must decide on the similar Elliptic Curve E on a binary field as a n2+mn= m3+bm2+c equation, where b, c ∈{0,1}.Let C and D be two points on E as C=(x1,y1) and D=(x2,y2) with C≠D. Thus it is possible to calculate point point O = C+D = (x3,y3). This system includes the following steps with these coordinate points:  Key Generation and Exchange Phase  Encryption phase
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1657  Transmission phase  Decryption phase ii) EC- Schnorr Scheme The distinction between EC-Schnorr and standard ECC is with respect to the process of signature creation. Compared to standard ECC scheme,theamountofmodular processes is condensedtominimizethecomputational cost of signature generation. iii) ECC-Montgomery Scheme As a conventional ECC schema ECC-Montgomery too resembles all its measures. Only the distinction, as stated in [34 ], is in the signature generations stepsandthe procedure from [ 34 ] is applied to implement Montgomery ECDSA. iv) ECC Watermark Scheme The ECC Watermark system proposed [31] is centred on fragile watermarking zero. A fragile zero-watermark is produced since the areas of the information packet header instead of adding continuous alteration by inserting additional parts into the packet payload. This system of watermark essentially gives the receiving device the legitimacy of the sender device by inspecting the watermark of the sender. Furthermore, application of ECC for encoded packets offers powerful safety aswell asinformationsecrecy by creating multiplication of curve points and adding complicated and harder to decrypt attackers. The ECC Watermark Scheme stages are as follows: • Key Generation and Exchange Phase • Encryption Phase • Transmission Phase • Decryption Phase Analysing and comparing the system results of various schemes in this work is done: ECCWatermark,standardECC, EC-Schnorr and ECC-Montgomery schemes in terms of memory and calculation costs. The proposed [31] ECC Watermark system, the creation and verification of watermarks need considerably less period and memory to process. This is primarily since the multiplication points of elliptic curve is needless for the creation of watermarks as well as the authenticity of a sender device is checked at a receiver node by inspecting the header source IP and protocol of the watermark data packet. With an enhanced packet information volume, after encoding information at a source device, it is noted thattheECCWatermark system has greater performance effectiveness with respect to computational price at a destination device and price of memory. 3. CONCLUSIONS The continuing state of the IoT shows that important research remains to be done to secure embedded computer equipment. Despite the increase in the count of IoT devices as well as fresh techniques and science journals over the previous few years, safety solutionsandimprovementshave not held pace. Publicly known breaches of safety initiation vectors point to vulnerable and/or overlooked IoT devices and the amount of stolen documents continues to increase. The quantity of information handled by IoT devices rises at exponential rates, which impliesgreater exposureofdelicate information and raises the need for discussion amongsafety scientists to be encouraged. Recent attempts have failed to cover the entire safety spectrum, revealing opportunities for studies in various fields, including intelligent object hardening and detection capacities. Current issues and difficulties should be taken as possibilities for enhancement that must be accomplished through a strict method that includes early design safety goals and the competent and effective implementation of standardized safety solutionsinmanufacturingphases.Final consumers also need to comprehend the device's primary goal and how to meet their demands under rigorous control and scrutiny in order to handle the interconnectivity danger that is always present. REFERENCES [1] Daniel Minoli ,Kazem Sohraby et al, IoT security (IoTSec) considerations, requirements, and architectures, 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) Las Vegas, NV, USA, 2017. [2] Darshana Pritam Shah, Pritam Gajkumar Shah, Revisting of Elliptical Curve Cryptography forSecuringInternetof Things (IOT), 2018 Advances in Science and Engineering Technology International Conferences (ASET), Abu Dhabi, United Arab Emirates 2018. [3] https://github.com/miracl/MIRACL [4] D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. New York: Springer, 2004. [5] ] https://eprint.iacr.org/2013/734.pdf [6] N. Koblitz, "Elliptic curve cryptosystems,"inMathematics of Computation vol. 48, ed: American Mathematical Society, 1987. [7] V. Miller, Uses of elliptic curves in cryptography vol. 218: Springer, Heidelberg, 1986 [8] D. Akilandeswari, S. Albert Rabara and T. Daisy Premila Bai, ECC-Enabled Translation Mechanism for Intercommunication Between IPv4 and IPv6, 2018
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1658 International Conference on Communication andSignal Processing (ICCSP) [9] Koblitz, N., “Elliptic curve cryptosystems”. Mathematics of Computation, Vol.49, pp. 203-209, 1987 [10] V.Miller, “Uses of elliptic curves in cryptography,” Crypto 1985, LCNS 218: Advances in Cryptology, Springer-Verlag, 1986. [11] Moncef, A., Amar, S. “Elliptic curve cryptography and its applications”,ProceedingsIEEEInternational Workshop on Systems, Signal Processing and their Applications (WOSSPA), 9th-11th May, Algeria, pp. 247-250, 2011. [12] C. Paar and J. Pelzl, Understanding cryptography, a textbook for students and practitioners. Springer Science & business Media, 2009 [13] Nejmeddine ALIMI, Younes LAHBIB, Mohsen MACHHOUT & Rached TOURKI, “On elliptic curve cryptography implementations and evaluation,”IEEEin proceedings of 2nd International Conference on Advanced TechnologiesforSignal andImageProcessing, ATSIP’2016, pp. 35-40, 2016. [14] Xiang Wang, Liping Wang, Yuanchen Bai, Zhenxue He, Tao Wang, bin Xu, He Zhang, Xiaocui Wang, “Optimization of elliptic curve cryptography resisting power attack scalar multiplication algorithminsecurity system on chip,” IEEE UIC-ATC-ScalCom-CBDCom-IoP, pp. 1397-1401, 2015. [15] Prasenjit Das, Chandan Giri, AnEfficientMethodfortext Encryption using Elliptic Curve Cryptography, 2018 IEEE 8th International Advance Computing Conference (IACC), Greater Noida, India. [16] Sheng Ding, Chen Li, Hui Li, A Novel Efficient Pairing- free CP-ABE Based on Elliptic Curve Cryptography for IoT, IEEE Access ,2018 [17] Rishav Gauniyal, Dr. Sarika Jain, IoT Securityin Wireless Devices, Proceedings of the Third International Conference on Electronics Communication and Aerospace Technology [ICECA 2019] IEEE Conference Record # 45616; IEEE Xplore ISBN:978-1-7281-0167-5 [18] Shams Shapsough, Fadi Aloul, Imran A Zualkernan (2018), “Securing Low-Resource Edge Devices for IoT Systems”, 2018 International SymposiuminSensingand Instrumentation in IoT Era (ISSI),Pages:1-4,Year:2018 [19] Adesh Kumari ; Vinod Kumar ; M.YahyaAbbasietal,The Cryptanalysis of a Secure Authentication Scheme Based on Elliptic Curve Cryptography for IOT and Cloud Servers, 2018 International Conference on Advancesin Computing, Communication Control and Networking (ICACCCN), Greater Noida (UP), India. [20] Ashaq Maqbool, Mohsin UI Islam et al, ScytherValidated Session Key Establishment in IoT, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India [21] Operational Semantics and Verification of Security Protocols[M], Berlin Heidelberg: Springer -Verlag, pp. 78-103, 2012. [22] Xiao, Y., Ravi, V. K. and Sun, B., 2007 “ A Survey of Key Management Schemes in Wireless Sensor Networks, ” Elsevier Journal of Computer Communications., Vol 30, pp 2314-2341 [23] Energy Efficient Implementation ofECDHKeyExchange for Wireless Sensor Networks: Crtien etal at IFIP International Federation for Information Processing 2009 [24] Huang, X. Shah, P. G and Sharma, D. 2010 “Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange, ” 4th IEEE International Conference on Network and System Security, pp. 588–593 [25] Gura, N., Patel, A., et. al 2004 ” Comparing Elliptic Curve Cryptography and RSA on 8 bit CPU, ” Workshop on cryptographic hardware and embedded systems [26] Operational Semantics and Verification of Security Protocols[M], Berlin Heidelberg: Springer -Verlag, pp. 78-103, 2012. [27] Menzes, B., “Network Security and Cryptography”, Cengage Learning [28] Hankerson, D. et al. “Guide to Elliptic Curve Cryptography” Springer. [29] Gura, N., Patel, A., Wander, A. S, Eberle, H. and Chang Shantz, S., 2004 “Comparing ellipticcurvecryptography and RSA on 8-bit CPUs”. Cryptographic Hardware and Embedded Systems, vol. 3156, pp. 119– 132. Springer [30] www.certicom.com accessed on 14-02-2019 [31] Kinza Sarwar, Sira Yongchareon et al, Lightweight ECC with Fragile Zero Water marking for Internet of ThingsSecurity, 2018 17th IEEE International Conference OnTrust,SecurityAndPrivacyInComputing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering. [32] Amara, M. and A. Siad. Elliptic Curve Cryptography and its applications. in Systems, Signal Processing and their Applications (WOSSPA), 2011 7th International Workshop on. 2011. IEEE. [33] Chatzigiannakis, I., A. Vitaletti, and A. Pyrgelis, A privacypreserving smart parking system using an IoT elliptic curve based
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1659 [34] Hossain, M.S. and G. Muhammad, Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Computer Networks, 2016. 101: p. 192-202. BIOGRAPHIES Mrs. Sapna obtained her B.E degree in Computer Science and Engineering from Visvesvaraya Technological University (VTU). She was awarded Master’s degree in Computer Networks and Engineering from Visvesvaraya Technological University (VTU). She is pursuing Ph.D degree from Visvesvaraya Technological University (VTU). Currently, she is an Assistant professor in the Department of Information Science and Engineering, Cambridge Institute of Technology, Visvesvaraya Technological University (VTU). Her specializations include Computer Networks and security, Machine Learning. Her current research interests are Security in Internet of Things. Dr.Dandinashivara Revanna Shashikumar received BE degree from Mysore University and ME degree from Bangalore University, Bangalore and Ph.D in Information and Communication Technology at Fakir Mohan University, Balasore, Orissa. He is currentlyworkingasProfessorand HoD, Dept. of Computer Science, Cambridge InstituteofTechnology, Visvesvaraya Technological University (VTU). His research interests include Microprocessors, Pattern Recognition, and Biometrics, Computer Networks, Data mining and Data Warehouse He has published 20 research publications in referred National and International Journals. He is the reviewer for some of the International journals.