The internet of things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer in...
详细信息
The internet of things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer interconnection over a network. IOT has the potential to provide unlimited benefits in daily life and the number of IOT devices is growing day by day. This scenario leads the internet world to be less secure. Since storage in each device is the main issue, cloud servers are relied upon to store the data. The data is accessed by the registered users for that particular network leading to the problem of security when many devices try to access the same network. Since the generated token has a threat of guessing or cryptanalysis attack, we worked on making it more secure by using cryptanalytics process. The cryptanalytics process is accomplished through the addition of logical operation of the token with OTP and hashing before sending the token to the user and service provider.
The Internet of Things (IoT) is a network of linked physical objects worldwide, communicating via the Internet to one another. IoT expects the interconnection between a few trillions of intelligent things and the coll...
详细信息
Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us t...
详细信息
ISBN:
(纸本)9781538659069
Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us this interconnection produce large amount of private information which needs to be processed, transferred and stored. So to provide security and privacy to this information in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices are guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. In this paper, we propose hybrid confidentiality algorithm which is a combination of Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC) and message-digest algorithm (MD5) algorithms. Geo encryption or location based encryption is also integrated with hybrid algorithm to give confidentiality to every devices. The hybrid algorithm enables strong confidentiality on the data transmission for Internet of things. Our proposed algorithm exhibits better performance in terms of encryption time, decryption time w.r.t. various file sizes.
Data integrity assurance and data origin authentication are important security aspects in commerce, financial transfer, banking, software, email, data storage, etc. Cryptographic hash functions specified by the Nation...
详细信息
Data integrity assurance and data origin authentication are important security aspects in commerce, financial transfer, banking, software, email, data storage, etc. Cryptographic hash functions specified by the National Institute of Standards and Technology (NIST) provides secure algorithms for data security. Hash functions are designed to digest the data and produce a hash message; a hash is a one-way function which is highly secured and difficult to invert. In this paper, two such hash algorithms are verified using the Universal Verification Methodology (UVM). UVM is IEEE 1800 standard developed to assist in the verification of digital designs; it reduces the hurdle in verifying complex and sophisticated designs.
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...
详细信息
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.
暂无评论