Security in Internet of Things (IoT) Hashing Cryptographic Functions

Authors

  • Himanshu Kumar Shukla Department of Computer Science & Engineering, BNCET, Lucknow (UP), India
  • Satyam Dubey Department of Computer Science & Engineering, BNCET, Lucknow (UP), India

Keywords:

Internet of Things (IoT), Wireless Sensor Networks (WSNs), Quality of Services(QoS), RC-5

Abstract

Internet of Things (IoT) begins new era of wireless interconnected devices, where every device have connectivity among each other. As looking towards today IP-Based communication structure all protocols plays a vital role in providing ubiquitous connectivity in all existing devices. All these devices are connected to each other in IoT and perform communication by using IP-based protocol. Throughout this communicating structure devices under network connection can be protected but for IoT connecting every device with Internet may take network under unsecure zone. These small issues created big problem to challenge security measures existing these days in IoT. To resolve these type of problems of security we analysed existing algorithms and hash cryptographic function and presented a modified Algorithms to do same operation but in less time as well as in less memory space. We also discussed present research for IoT’s security requirement and with also about future research path for IoT security and privacy.

 

References

Alberto M.C Souza and Jose R.A. Amazonas, `A Novel Smart Home Application Using an Internet of ThingsMiddleware`,European Conference on Smart Objects, Systems and Technologies, pp. 1-7, June 2013.

Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi, `Internet of Things for Smart Cities`, IEEE Internet of Things Journal, Vol. 1 No.1, pp. 22-32, February 2014.

Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman,`Wireless Sensor Networks and the Internet of Things:Do We Need a Complete Integration?`, SecloT Japan, November 2010.

Chang, K. C. Gupta and M. Nandi, "RC4-Hash: A New Hash Function Based on RC4", Proc. INDOCRYPT, LNCS 4329, pp. 80-94, Springer, 2006.

Fagen Li and Pang Xiong , `Practical Secure Communication forIntegrating Wireless Sensor Networks Into the Internet of Things`

Kelly, S.D.T., Suryadevara, N.K., Mukhopadhyay, S.C.,`Towards the implementation of loT for Environmental Condition Monitoring in Homes`, Vol.I 3 No. 10, pp. 3846-3853, August 2013.

M.Tharani, M.Senthilkumar , `Integrating Wireless Sensor Networks into Internet Of Things For Security` IJIRCCE VoI.2 No.1, March 2014.

Ming Wang, Guiquing Zhang, Jianbin Zhang, Chengdong Li, `An loT-based Appliance Control System for Smart Homes` ICICIP , pp. 744-747, 2013.

Dr. Pritam Gajkumar Shah, Javeria Ambareen, `A Survey of Security Challenges in Internet of Things (loT) Integration with WSW, AUSJOURNAL,2014.

Pormante, L. Rinaldi, C. Santic, M.Tennina, S., `Performance analysis of a lightweight RSSI-based localization algorithm for Wireless Sensor Networks`, ISSCS , pp. 1-4, June 2013.

Sang-Eon Lee, Sang-Ho Shin, Geum-Dal Park and Kee-Young Yoo, `Wireless Sensor Network Protocols for Secure and Energy- Efficient Data Transmission` Proceedings of the CISIM`08 on Computer Information Systems and Industrial Management Applications, pp. 157-162, June 2008.

Sye Loong Keoh, Sandeep S. Kumar, and Hannes Tschofenig,`Securing the Internet of Things A Standardization Perspective`, IEEE INTERNET OF THINGS JOURNAL, Vol. I, No. 3, pp. 265-275, June 2014.

Wade Trappe, Lawrence C. Washington, `Introduction to Cryptography with Coding Theory.

Woo Kwon Koo, Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, `Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks` International conference on Information assurance and security, pp. 73-76., 2008.

Xu Li, Rongxing Lu, Xiaohui Liang, and Xuemin (Sherman) Shen, `Smart community An Internet of Things Application`, IEEE Communications magazine, Vol. 49 No.ll, pp. 68-75, November 2011.

Downloads

Published

2019-06-30

How to Cite

[1]
H. K. Shukla and S. Dubey, “Security in Internet of Things (IoT) Hashing Cryptographic Functions”, Int. J. Sci. Res. Net. Sec. Comm., vol. 7, no. 3, pp. 7–11, Jun. 2019.

Issue

Section

Research Article