Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture

被引:19
|
作者
Kumar, V. Vijaya [1 ]
Devi, M. [2 ]
Raja, P. Vishnu [3 ]
Kanmani, P. [4 ]
Priya, V [5 ]
Sudhakar, Sengan [6 ]
Sujatha, Krishnamoorthy [7 ]
机构
[1] AVS Engn Coll, Dept Comp Sci & Engn, Salem 636003, Tamil Nadu, India
[2] King Khalid Univ, Coll Sci & Arts Sarat Abidah, Dept Comp Sci, Abha, Saudi Arabia
[3] Kongu Engn Coll, Dept Comp Sci & Engn, Perundurai, Tamil Nadu, India
[4] KS Rangasamy Coll Technol, Dept Comp Sci & Engn, Tiruchengode 637415, Tamil Nadu, India
[5] Mahendra Inst Technol, Dept Comp Sci & Engn, Namakkal 637503, Tamil Nadu, India
[6] Sree Sakthi Engn Coll, Dept Comp Sci & Engn, Coimbatore 641104, Tamil Nadu, India
[7] Wenzhou Kean Univ, Dept Comp Sci, Wenzhou 325060, Peoples R China
关键词
Security protocol; Internet of things; Network; Cryptograph; Key management; SERVICES; PRIVACY;
D O I
10.1016/j.micpro.2020.103216
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent times, Internet connected technologies and applications have seen tremendous growth as everyone is inclined to enjoy the benefits offered by them. An upcoming technology called Internet of Things (IoT) has increased the capacity of internet to take in numerous computing devices. With respect to the prevailing IP-based Security Protocol (SecP) suites, which rely on the conventions of Network Topology (NT) and device and network (n/w) abilities to decide on the designs of the employed Security Mechanisms (SecM). In this work, we address by putting forth a unified IoT framework model dependent on the Mobile Security IP IoT Architecture (MSIP-IoT-A) which exclusively concentrates on supporting Sec for the IoT. The model suggested by us, brings together local IoT systems with the global Internet with no loss in its usage, ability of cross operation and protecting the Sec. An Internet of Things (IOT) - Name Determination Check (NDC) is proposed as the main part of the middleware layer by us in this article and we also generate a We propose an IoT-NDC as a core component of the, and develop a not so heavy but light keying protocol capable of establishing a trust amid an IoT device and the IoT-NDC. Moreover, we attempt of identify and fix this issue by suggesting a peer-to-peer SecP for fulfilling a range of environment. We have applied safe communication (comm.) upon an open sourced platform for the IoT. Ultimately, with assessment and studies with the help of models and data from the SecPlogic, we conclude that the suggested methodology is effective to fulfill the mentioned objective and can be used for the platform.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] An Architecture for Managing Internet of Things based on Cognitive Peer-to-peer Networks
    Ghorbani, Mahdi
    Meybodi, Mohammad Reza
    Saghiri, Ali Mohammad
    2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 111 - 116
  • [32] A peer-to-peer reference architecture
    Singh, Atul
    Haahr, Mads
    First Int. Conf. Com. Syst. Softw. Middleware Comsware,
  • [33] A peer-to-peer reference architecture
    Singh, Atul
    Haahr, Mads
    2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 109 - +
  • [34] A peer-to-peer simulation architecture
    Duvenhage, Bernardt
    le Roux, Willem H.
    21ST EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2007: SIMULATIONS IN UNITED EUROPE, 2007, : 684 - 690
  • [35] An architecture for peer-to-peer economies
    Strulo, B
    Smith, A
    Farr, J
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 208 - 209
  • [36] A peer-to-peer communication system
    Li, Y
    Li, J
    Yu, K
    Wang, KB
    Li, SP
    Zhang, YQ
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 873 - 879
  • [37] Reputation in peer-to-peer communication
    Hussain, FK
    Chang, E
    Dillon, T
    IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 269 - 271
  • [38] A Hybrid Protocol Architecture for Peer-to-Peer Control Based on SIP and UPnP
    Thomas, Kevin
    Gruver, William A.
    Sabaz, Dorian
    Ng, Colin
    2009 IEEE INTERNATIONAL SYSTEMS CONFERENCE, PROCEEDINGS, 2009, : 262 - +
  • [39] Using peer-to-peer communication to improve the performance of distributed computing on the Internet
    Tritrakan, K
    Muangsin, V
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 295 - 298
  • [40] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195