Encrusted Security for Internet of Things Using MAC-OMURA

  • Baik N
  • Sharma S
  • Khuntia B
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

The day is not far when the entire universe is moving to adopt smart technology in their regular lifestyle. Every activity and smart objects will be monitored through mobiles and sensor devices from a remote location. Such as smart home appliance, smart home, bright kitchen, smart health, smart farming, and smart harvesting. All this will become possible with internet. But due the sensitivity of the smart object, it can creates the threats to objects, if the control moves to malicious hand, he/she may use in different way, so by observing its sensitivity we have to think about security of the object either for the device itself or providing the security for our data using cryptography technique. Cryptography can be done in two ways with symmetric key cryptography 'or' asymmetric key cryptography, the strength of the security algorithm is the key and one key become vulnerable then it become difficult to secure the system because nothing is advisable other than breaking the key to fire brute force attack, a cryptanalyst needs a small amount of cipher text on the corresponding plain text. Brute force attack is known as Plain text attack. For block cipher the cryptanalyst would need a block of cipher text and corresponding plain text, generally 64- bit. In our proposed system, work is contributed towards private key cryptography associated with digital signature to construct strong security and in send phase this system will become stronger once we apply the MAC, resulting cryptography equation will be represent in the face of C.T = E3 [E2[E1(P,K)+DS]+MAC]. © 2018 SERSC Australia.

Cite

CITATION STYLE

APA

Baik, N., Sharma, S. K., & Khuntia, B. (2018). Encrusted Security for Internet of Things Using MAC-OMURA. International Journal of Control and Automation, 11(2), 45–54. https://doi.org/10.14257/ijca.2018.11.2.05

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free