Full Paper View Go Back

Security in Internet of Things (IoT) Hashing Cryptographic Functions

Himanshu Kumar Shukla1 , Satyam Dubey2

Section:Research Paper, Product Type: Journal
Vol.7 , Issue.3 , pp.7-11, Jun-2019

Online published on Jul 30, 2019


Copyright © Himanshu Kumar Shukla, Satyam Dubey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Himanshu Kumar Shukla, Satyam Dubey, “Security in Internet of Things (IoT) Hashing Cryptographic Functions,” International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.3, pp.7-11, 2019.

MLA Style Citation: Himanshu Kumar Shukla, Satyam Dubey "Security in Internet of Things (IoT) Hashing Cryptographic Functions." International Journal of Scientific Research in Network Security and Communication 7.3 (2019): 7-11.

APA Style Citation: Himanshu Kumar Shukla, Satyam Dubey, (2019). Security in Internet of Things (IoT) Hashing Cryptographic Functions. International Journal of Scientific Research in Network Security and Communication, 7(3), 7-11.

BibTex Style Citation:
@article{Shukla_2019,
author = {Himanshu Kumar Shukla, Satyam Dubey},
title = {Security in Internet of Things (IoT) Hashing Cryptographic Functions},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2019},
volume = {7},
Issue = {3},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {7-11},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=365},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=365
TI - Security in Internet of Things (IoT) Hashing Cryptographic Functions
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Himanshu Kumar Shukla, Satyam Dubey
PY - 2019
DA - 2019/07/30
PB - IJCSE, Indore, INDIA
SP - 7-11
IS - 3
VL - 7
SN - 2347-2693
ER -

813 Views    425 Downloads    260 Downloads
  
  

Abstract :
Internet of Things (IoT) begins new era of wireless interconnected devices, where every device have connectivity among each other. As looking towards today IP-Based communication structure all protocols plays a vital role in providing ubiquitous connectivity in all existing devices. All these devices are connected to each other in IoT and perform communication by using IP-based protocol. Throughout this communicating structure devices under network connection can be protected but for IoT connecting every device with Internet may take network under unsecure zone. These small issues created big problem to challenge security measures existing these days in IoT. To resolve these type of problems of security we analysed existing algorithms and hash cryptographic function and presented a modified Algorithms to do same operation but in less time as well as in less memory space. We also discussed present research for IoT’s security requirement and with also about future research path for IoT security and privacy.

Key-Words / Index Term :
Internet of Things (IoT); Wireless Sensor Networks (WSNs); Quality of Services(QoS); RC-5; Skipjack; AES; Low Power Wireless Personal Local Area Network (LoWPAN); Radio Frequency Identification (RFID).

References :
[1] Alberto M.C Souza and Jose R.A. Amazonas, `A Novel Smart Home Application Using an Internet of ThingsMiddleware`,European Conference on Smart Objects, Systems and Technologies, pp. 1-7, June 2013.
[2] Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi, `Internet of Things for Smart Cities`, IEEE Internet of Things Journal, Vol. 1 No.1, pp. 22-32, February 2014.
[3] Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman,`Wireless Sensor Networks and the Internet of Things:Do We Need a Complete Integration?`, SecloT Japan, November 2010.
[4] Chang, K. C. Gupta and M. Nandi, "RC4-Hash: A New Hash Function Based on RC4", Proc. INDOCRYPT, LNCS 4329, pp. 80-94, Springer, 2006.
[5] Fagen Li and Pang Xiong , `Practical Secure Communication forIntegrating Wireless Sensor Networks Into the Internet of Things`
[6] Kelly, S.D.T., Suryadevara, N.K., Mukhopadhyay, S.C.,`Towards the implementation of loT for Environmental Condition Monitoring in Homes`, Vol.I 3 No. 10, pp. 3846-3853, August 2013.
[7] M.Tharani, M.Senthilkumar , `Integrating Wireless Sensor Networks into Internet Of Things For Security` IJIRCCE VoI.2 No.1, March 2014.
[8] Ming Wang, Guiquing Zhang, Jianbin Zhang, Chengdong Li, `An loT-based Appliance Control System for Smart Homes` ICICIP , pp. 744-747, 2013.
[9] Dr. Pritam Gajkumar Shah, Javeria Ambareen, `A Survey of Security Challenges in Internet of Things (loT) Integration with WSW, AUSJOURNAL,2014.
[10] Pormante, L. Rinaldi, C. Santic, M.Tennina, S., `Performance analysis of a lightweight RSSI-based localization algorithm for Wireless Sensor Networks`, ISSCS , pp. 1-4, June 2013.
[11] Sang-Eon Lee, Sang-Ho Shin, Geum-Dal Park and Kee-Young Yoo, `Wireless Sensor Network Protocols for Secure and Energy- Efficient Data Transmission` Proceedings of the CISIM`08 on Computer Information Systems and Industrial Management Applications, pp. 157-162, June 2008.
[12] Sye Loong Keoh, Sandeep S. Kumar, and Hannes Tschofenig,`Securing the Internet of Things A Standardization Perspective`, IEEE INTERNET OF THINGS JOURNAL, Vol. I, No. 3, pp. 265-275, June 2014.
[13] Wade Trappe, Lawrence C. Washington, `Introduction to Cryptography with Coding Theory.
[14] Woo Kwon Koo, Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, `Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks` International conference on Information assurance and security, pp. 73-76., 2008.
[15] Xu Li, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen, `Smart community An Internet of Things Application`, IEEE Communications magazine, Vol. 49 No.ll, pp. 68-75, November 2011.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation