Secure and authenticated naming scheme for IoT devices in heterogeneous networks

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Naming the device is the main challenge in IoT and getting authentication from the sensors is possible only with secured naming services. Naming a form of addressing the sensor nodes should be readable or understandable by humans or M2M communications. Existing naming schemes have scalability and security limitations. Hence, this paper proposes an efficient and secure distributed naming scheme for IoT in heterogeneous network. Hyper-Elliptic Curve Diffie-Hellman Key Exchange (HECDH) is used in the naming scheme for the exchange of keys. This technique reduces the communication and computation complexity. The heterogeneous model of the proposed technique is simulated and the analysis has been carried out. Digital Signature (i.e., Private Key) is used to verify the node authencity. Monitoring of the node in the network is implemented using IP based Position monitoring and Intruder Detection system (IDS) is implemented for detecting the attacks. The performance metrics such Energy consumption, PDR, Total Traffic, Delay, Average Response Time and Throughput of the proposed model was simulated using Contiki / Cooja version 2.7 simulator.

Cite

CITATION STYLE

APA

Tamizh Selvan, C., & Vijayalkshmi, V. (2019). Secure and authenticated naming scheme for IoT devices in heterogeneous networks. International Journal of Innovative Technology and Exploring Engineering, 8(10), 3815–3820. https://doi.org/10.35940/ijitee.J9989.0881019

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free