Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture

被引:18
|
作者
Kumar, V. Vijaya [1 ]
Devi, M. [2 ]
Raja, P. Vishnu [3 ]
Kanmani, P. [4 ]
Priya, V [5 ]
Sudhakar, Sengan [6 ]
Sujatha, Krishnamoorthy [7 ]
机构
[1] AVS Engn Coll, Dept Comp Sci & Engn, Salem 636003, Tamil Nadu, India
[2] King Khalid Univ, Coll Sci & Arts Sarat Abidah, Dept Comp Sci, Abha, Saudi Arabia
[3] Kongu Engn Coll, Dept Comp Sci & Engn, Perundurai, Tamil Nadu, India
[4] KS Rangasamy Coll Technol, Dept Comp Sci & Engn, Tiruchengode 637415, Tamil Nadu, India
[5] Mahendra Inst Technol, Dept Comp Sci & Engn, Namakkal 637503, Tamil Nadu, India
[6] Sree Sakthi Engn Coll, Dept Comp Sci & Engn, Coimbatore 641104, Tamil Nadu, India
[7] Wenzhou Kean Univ, Dept Comp Sci, Wenzhou 325060, Peoples R China
关键词
Security protocol; Internet of things; Network; Cryptograph; Key management; SERVICES; PRIVACY;
D O I
10.1016/j.micpro.2020.103216
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, Internet connected technologies and applications have seen tremendous growth as everyone is inclined to enjoy the benefits offered by them. An upcoming technology called Internet of Things (IoT) has increased the capacity of internet to take in numerous computing devices. With respect to the prevailing IP-based Security Protocol (SecP) suites, which rely on the conventions of Network Topology (NT) and device and network (n/w) abilities to decide on the designs of the employed Security Mechanisms (SecM). In this work, we address by putting forth a unified IoT framework model dependent on the Mobile Security IP IoT Architecture (MSIP-IoT-A) which exclusively concentrates on supporting Sec for the IoT. The model suggested by us, brings together local IoT systems with the global Internet with no loss in its usage, ability of cross operation and protecting the Sec. An Internet of Things (IOT) - Name Determination Check (NDC) is proposed as the main part of the middleware layer by us in this article and we also generate a We propose an IoT-NDC as a core component of the, and develop a not so heavy but light keying protocol capable of establishing a trust amid an IoT device and the IoT-NDC. Moreover, we attempt of identify and fix this issue by suggesting a peer-to-peer SecP for fulfilling a range of environment. We have applied safe communication (comm.) upon an open sourced platform for the IoT. Ultimately, with assessment and studies with the help of models and data from the SecPlogic, we conclude that the suggested methodology is effective to fulfill the mentioned objective and can be used for the platform.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] PGSP: A protocol for secure communication in peer-to-peer system
    Arora, N
    Shyamasundar, RK
    [J]. 2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF, 2005, : 2094 - 2099
  • [2] A Peer-to-Peer Secure VoIP Architecture
    Cirani, Simone
    Pecori, Riccardo
    Veltri, Luca
    [J]. TRUSTWORTHY INTERNET, 2011, : 105 - 115
  • [3] Peer-to-peer communication protocol
    Neel, A
    LeBlanc, LR
    Park, JC
    Smith, SM
    [J]. SEA TECHNOLOGY, 1998, 39 (05) : 10 - 15
  • [4] A secure routing protocol for peer-to-peer network
    Xiang, Xu
    Chen, Jianguo
    [J]. Journal of Convergence Information Technology, 2010, 5 (04)
  • [5] SPP: A Secure Protocol for Peer-to-Peer Systems
    Quang Hieu Vu
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 1 - 6
  • [6] Secure peer-to-peer Group Communication Framework
    Noda, J
    Taguchi, D
    Tani, M
    Nakamura, N
    [J]. NEC RESEARCH & DEVELOPMENT, 2003, 44 (04): : 333 - 339
  • [7] A peer-to-peer communication protocol for underwater acoustic communication
    Smith, SM
    Park, JC
    Neel, A
    [J]. OCEANS '97 MTS/IEEE CONFERENCE PROCEEDINGS, VOLS 1 AND 2, 1997, : 268 - 272
  • [8] Peer-to-Peer Communication, Cancer Prevention, and the Internet
    Ancker, Jessica S.
    Carpenter, Kristen M.
    Greene, Paul
    Hoffman, Randi
    Kukafka, Rita
    Marlow, Laura A. V.
    Prigerson, Holly G.
    Quillin, John M.
    [J]. JOURNAL OF HEALTH COMMUNICATION, 2009, 14 : 38 - 46
  • [9] A peer-to-peer architecture for secure data storage with query
    Marceau, C
    Hanna, J
    McCullough, D
    Popli, A
    Stillerman, M
    [J]. Defense Transformation and Network-Centric Systems, 2005, 5820 : 243 - 254
  • [10] WonGoo: A peer-to-peer protocol for anonymous communication
    Lu, TB
    Fang, BX
    Sun, YZ
    Cheng, XQ
    [J]. PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 1102 - 1106