The day is not far when the entire universe is moving to adopt smart technology in their regular lifestyle. Every activity and smart objects will be monitored through mobiles and sensor devices from a remote location. Such as smart home appliance, smart home, bright kitchen, smart health, smart farming, and smart harvesting. All this will become possible with internet. But due the sensitivity of the smart object, it can creates the threats to objects, if the control moves to malicious hand, he/she may use in different way, so by observing its sensitivity we have to think about security of the object either for the device itself or providing the security for our data using cryptography technique. Cryptography can be done in two ways with symmetric key cryptography 'or' asymmetric key cryptography, the strength of the security algorithm is the key and one key become vulnerable then it become difficult to secure the system because nothing is advisable other than breaking the key to fire brute force attack, a cryptanalyst needs a small amount of cipher text on the corresponding plain text. Brute force attack is known as Plain text attack. For block cipher the cryptanalyst would need a block of cipher text and corresponding plain text, generally 64- bit. In our proposed system, work is contributed towards private key cryptography associated with digital signature to construct strong security and in send phase this system will become stronger once we apply the MAC, resulting cryptography equation will be represent in the face of C.T = E3 [E2[E1(P,K)+DS]+MAC]. © 2018 SERSC Australia.
CITATION STYLE
Baik, N., Sharma, S. K., & Khuntia, B. (2018). Encrusted Security for Internet of Things Using MAC-OMURA. International Journal of Control and Automation, 11(2), 45–54. https://doi.org/10.14257/ijca.2018.11.2.05
Mendeley helps you to discover research relevant for your work.