IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Multi-Layer and Clustering-Based Security Implementation for an IoT Environment

Multi-Layer and Clustering-Based Security Implementation for an IoT Environment
View Sample PDF
Author(s): Deena Nath Gupta (Jamia Millia Islamia, India)and Rajendra Kumar (Jamia Millia Islamia, India)
Copyright: 2022
Volume: 11
Issue: 2
Pages: 21
Source title: International Journal of System Dynamics Applications (IJSDA)
Editor(s)-in-Chief: Ahmad Taher Azar (College of Computer & Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia & Faculty of Computers and Artificial Intelligence, Benha University, Benha, Egypt)
DOI: 10.4018/IJSDA.20220701.oa3

Purchase

View Multi-Layer and Clustering-Based Security Implementation for an IoT Environment on the publisher's website for pricing and purchasing information.

Abstract

IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in large amount to collect the relevant data in an IoT environment, and different sensor devices transmit these data as useful information, the first thing needs to be secure is the identity of devices. The second most important thing is the reliable information transmission between a sensor node and a sink node. While designing the cryptographic method in the IoT environment, programmers need to keep in mind the power limitation of the constraint devices. Mutual authentication between devices and encryption-decryption of messages need some sort of secure key. In the proposed cryptographic environment, there will be a hierarchical clustering, and devices will get registered by the authentication center at the time they enter the cluster. The devices will get mutually authenticated before initiating any conversation and will have to follow the public key protocol.

Related Content

Trung-Nghia Phung, Duc-Binh Nguyen, Ngoc-Phuong Pham. © 2024. 16 pages.
Piyanee Akkawuttiwanich, Pisal Yenradee, Narudh Cheramakara. © 2024. 26 pages.
Kanokwan Singha, Parthana Parthanadee, Ajchara Kessuvan, Jirachai Buddhakulsomsiri. © 2024. 14 pages.
Waranyoo Thippo, Chorkaew Jaturanonda, Sorawit Yaovasuwanchai, Charoenchai Khompatraporn, Teeradej Wuttipornpun, Kulwara Meksawan. © 2024. 28 pages.
Porferio Almerino Jr., Marilou Martinez, Rogelio Sala Jr., Kent Maningo, Lourdes Garciano, Christine Catyong, Marvin Guinocor, Gerly Alcantara, John de Vera, Veronica Calasang, Randy Mangubat, Larry Peconcillo Jr., Emerson Peteros, Charldy Wenceslao, Rica Villarosa, Lanndon Ocampo. © 2024. 23 pages.
Supanat Sukviboon, Pisal Yenradee. © 2023. 23 pages.
Porntip Junsang, Chorkaew Jaturanonda, Teeradej Wuttipornpun, Mayurachat Watcharejyothin. © 2023. 25 pages.
Body Bottom