A Lightweight Trust Scheme for Iot

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The Internet of Things (IoT) refers to system in which smart objects interact with each other with the aid of sensors and actuators through wired/wireless connection. When an IoT concept is implemented for real life application, the possibility of the system being attacked increases. The security measures have to be improved to prevent the attacks.  This paper introduces light weight security schemes for authentication and encryption.  This system uses Blom’s scheme for authentication and Elliptic curve cryptography for encryption. Both these schemes are claimed to be light weight and hence is applicable of IoT applications which is a constrained environment.  These security schemes are applied for healthcare system. The system is proved to be strong against the security attacks.

     


  • Keywords


    IoT, Blom, Ecc, Security and privacy.

  • References


      [1] Sicari, Sabrina, et al. "Security, privacy and trust in Internet of Things: The road ahead." Computer Networks 76: 146-164. (2015)

      [2] Lee, Jun-Ya, Wei-Cheng Lin, and Yu-Hung Huang. "A lightweight authentication protocol for internet of things." Next-Generation Electronics (ISNE),International Symposium on. IEEE, (2014).

      [3] Pöhls, Henrich C., et al. "RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects." Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE,(2014).

      [4] Bhoomika, B. K., and K. N. Muralidhara. "Secured smart healthcare monitoring system based on IoT." International Journal on Recent and Innovation Trends in Communication 3.7: 4958-61 (2015).

      [5] Du, Wenliang, et al. "A pairwise key predistribution scheme for wireless sensor networks." ACM Transactions on Information and System Security (TISSEC) 8.2: 228-258 (2005).

      [6] Chithra Selvaraj, Sheila, “Peer Profile Based Trust Model for P2P Systems using Genetic Algorithm”, Peer-to-Peer Networking and Applications 5:92–103, DOI 10.1007/s12083-011-0111-9, volume 5, p92-103 (2012).

      [7] Bhalaji N., Selvaraj C. “Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems, Advances in Intelligent Systems and Computing”, vol 508. Springer(2017).

      [8] Chithra Selvaraj, Sheila, “A Role Based Trust Model for Peer to Peer Systems Using Credential Trees”, International Journal of Computer Theory and Engineering, Vol.3, No.2, , ISSN: 1793-8201(2011).

      [9] N.Bhalaji, Dr.A.Shanmugam “A Trust Based Model to Mitigate Blackhole Attacks in DSR Based MANET” in European Journal of Scientific Research, Vol.50.No.1. 2011. Pp 6-. ISSN 1450-216X/1450-202X (SJR=0.034) (2014)

      [10] N.Bhalaji, Dr.A.Shanmugam “ Dynamic Trust Based Method to Mitigate Greyhole Attack in Mobile Adhoc Networks” (ICCTSD’11) Procedia Engineering pp. 907- 914,(2011).

      [11] Li H, Singhal M (2007) “Trust management in distributed systems”, 0018-9162/07 IEEE Journal – Feb (2007).

      [12] Song S, Hwang K, Zhou R. “Trusted P2P transactions with fuzzy reputation aggregation” Published by the IEEE Computer Society 1089-7801/05, (2005).

      [13] Aman Kumar, Dr. Sudesh Jakhar, Mr. Sunil Makkar “Comparative Analysis between DES and RSA Algorithm’s” International Journal of Advanced Research in Computer Science and Software Engineering, JULY (2012).


 

View

Download

Article ID: 18974
 
DOI: 10.14419/ijet.v7i3.34.18974




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.