A Cryptographic Technique for Communication among IoT Devices using Tiger192 and Whirlpool

0Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

The heterogeneous standards and operational platforms of IoT devices, introduce additional security loopholes into the network thereby increasing the attack surface for the IoT. Most of the devices used in these IoT systems are not secure by design. Such vulnerable devices pose a great threat to the IoT system. In recent times, there have been a lot of research works on improving existing mechanisms for securing IoT data at both the software and hardware levels. Although there exist cryptographic research solutions to secure data at the node level in IoT systems, there is not a lot of these security solutions that target securing both the IoT data and validating IoT nodes. The Authors propose a cryptographic solution that uses double hashing to provide improved security for IoT node data and validating nodes in IoT system. A cryptographic mechanism that is composed of the Tiger192 cryptographic hash and the whirlpool hash function is proposed in authenticating IoT data and validating devices in this paper. The use of digital ledger technology and cryptographic double hashing algorithm provided enhanced security, privacy, and integrity of data among IoT nodes. It also assured the availability of IoT data

Cite

CITATION STYLE

APA

Asare, B. T., Quist-Aphetsi, K., & Nana, L. (2021). A Cryptographic Technique for Communication among IoT Devices using Tiger192 and Whirlpool. International Journal of Advanced Computer Science and Applications, 12(8), 456–462. https://doi.org/10.14569/IJACSA.2021.0120853

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free