Vis enkel innførsel

dc.contributor.authorKar, Pushpendu
dc.contributor.authorMisra, Sudip
dc.contributor.authorMandal, Ankush Kumar
dc.contributor.authorWang, Hao
dc.date.accessioned2019-04-24T12:09:38Z
dc.date.available2019-04-24T12:09:38Z
dc.date.created2019-01-17T18:39:29Z
dc.date.issued2018
dc.identifier.citationFICN '18 Proceedings of the 1st International Workshop on Future Industrial Communication Networksnb_NO
dc.identifier.isbn978-1-4503-5929-0
dc.identifier.urihttp://hdl.handle.net/11250/2595287
dc.description.abstractInternet of Things (IoT) is a network of physical devices which are accessible through the Internet. All the devices are assigned with an IP address and are competent enough to collect data and provide some services. The installed technology and software used in all these smart items help them to interact with the end-user(s). Thus the IoT network becomes more vulnerable to attacks by external entities. Consequently, it is required to check the leakage of any information during message transmission in the network. Message injection, relay attacks, and side channel attacks by a malicious node can result in privacy loss and security hacks. Service-Oriented Architecture help vendors provide services to the consumer over a network following some protocols. In this paper we have implemented a security scheme that can be suitable for Service Oriented Architecture (SOA) based IoT network. The proposed scheme allows to transfer data in a network only if the public key (encrypted hop-count) received by the packet matches with the public key(decrypted hop-count) between the source and destination node stored in the routing table. Otherwise, the data is considered to be malicious and discarded from the network. A non-cooperative Stackelberg game based mathematical model is presented, which considers defenders as leaders and attackers as followers. We have simulated our proposed scheme and have compared it with the existing security and authentication scheme, UAKMP, in identical conditions. From the analysis of the results we evaluate that, SecureIoT has improved performance with reduced communication overheads.nb_NO
dc.language.isoengnb_NO
dc.publisherACMnb_NO
dc.relation.ispartofProceedings of the 1st International Workshop on Future Industrial Communication Networks
dc.titleSecureIoT: Hop-Count Based Service-Oriented Efficient Security Solution for IoTnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber15-20nb_NO
dc.identifier.doi10.1145/3243318.3243323
dc.identifier.cristin1659758
cristin.unitcode194,63,55,0
cristin.unitnameInstitutt for IKT og realfag
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel